General
-
Target
b149ea4b2d411ea41806a7fe3443f490b2f7fde4377170902ad4f2ac7cddf9e5
-
Size
537KB
-
Sample
230312-f1hbgaeh2t
-
MD5
bf39d7164b6b882a44d9c0331293af9c
-
SHA1
89e4f7860c409ae07725e0f87ab7a59a910e8754
-
SHA256
b149ea4b2d411ea41806a7fe3443f490b2f7fde4377170902ad4f2ac7cddf9e5
-
SHA512
60c7e57dd42efb4fe597c1767b9e94049c9d24dcce7b80ca247eb4d383dd2494bcb3732663cd64345dd7109732bfe1fbb2469fb12237a0e17456fe6e265fa4ff
-
SSDEEP
12288:Nd5+vYnP4MFbt9ZJM8HHJE/aey6Pl+sZKXIm:NvPLl68JERySl+3N
Static task
static1
Behavioral task
behavioral1
Sample
b149ea4b2d411ea41806a7fe3443f490b2f7fde4377170902ad4f2ac7cddf9e5.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
well
193.233.20.28:4125
-
auth_value
265e7373dd436339d88347c08a10b402
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
b149ea4b2d411ea41806a7fe3443f490b2f7fde4377170902ad4f2ac7cddf9e5
-
Size
537KB
-
MD5
bf39d7164b6b882a44d9c0331293af9c
-
SHA1
89e4f7860c409ae07725e0f87ab7a59a910e8754
-
SHA256
b149ea4b2d411ea41806a7fe3443f490b2f7fde4377170902ad4f2ac7cddf9e5
-
SHA512
60c7e57dd42efb4fe597c1767b9e94049c9d24dcce7b80ca247eb4d383dd2494bcb3732663cd64345dd7109732bfe1fbb2469fb12237a0e17456fe6e265fa4ff
-
SSDEEP
12288:Nd5+vYnP4MFbt9ZJM8HHJE/aey6Pl+sZKXIm:NvPLl68JERySl+3N
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-