General
-
Target
0000ff2bbdd3222e624971f52d6ecf7c60e577dfc8888b590bb8923337b1c818.bin
-
Size
811KB
-
Sample
230311-24j55ade91
-
MD5
0c73747b9278a45d17b2301e633b4935
-
SHA1
8645adc3ec592fed6951008b6a22ce2ffebe1454
-
SHA256
0000ff2bbdd3222e624971f52d6ecf7c60e577dfc8888b590bb8923337b1c818
-
SHA512
b04c86ab7c5a3858c89bf80fdd06b5b50b67833b29451c2a20a43201730cce3acfe5da3dc53b981fa9d080c49539cc5d6ac8e1ef92d00f2cbf80e03872e417ae
-
SSDEEP
24576:IybnP6dOl5pSY6SLejXR28d7ZuVWkitrA/:PGdGh6pjXR2Q7uditr
Static task
static1
Behavioral task
behavioral1
Sample
0000ff2bbdd3222e624971f52d6ecf7c60e577dfc8888b590bb8923337b1c818.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0000ff2bbdd3222e624971f52d6ecf7c60e577dfc8888b590bb8923337b1c818.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Targets
-
-
Target
0000ff2bbdd3222e624971f52d6ecf7c60e577dfc8888b590bb8923337b1c818.bin
-
Size
811KB
-
MD5
0c73747b9278a45d17b2301e633b4935
-
SHA1
8645adc3ec592fed6951008b6a22ce2ffebe1454
-
SHA256
0000ff2bbdd3222e624971f52d6ecf7c60e577dfc8888b590bb8923337b1c818
-
SHA512
b04c86ab7c5a3858c89bf80fdd06b5b50b67833b29451c2a20a43201730cce3acfe5da3dc53b981fa9d080c49539cc5d6ac8e1ef92d00f2cbf80e03872e417ae
-
SSDEEP
24576:IybnP6dOl5pSY6SLejXR28d7ZuVWkitrA/:PGdGh6pjXR2Q7uditr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-