General
-
Target
8dd9d34ed5214c42ed9519c724b302a9b6d3232da9fdf947ede7c4a3bb9e8f9e
-
Size
787KB
-
Sample
230314-zexc2shg53
-
MD5
33e8bb286db4291272b9f0751babdac1
-
SHA1
ee443f9e6f4c9b23033556719c7788d76bbfb4c1
-
SHA256
8dd9d34ed5214c42ed9519c724b302a9b6d3232da9fdf947ede7c4a3bb9e8f9e
-
SHA512
6be95fb629ba798accc1eff1b0fdd539eddddad4aea8914be3fdaa08dab9898a4c03abc907f72bb88fe25b407473fe6aa3f641fd9793e25bb7f9c11f5d698cdd
-
SSDEEP
12288:4Mrdy90Erbo1wUMwXzacGrabNxZSv83B/WAbxnipohcc1c1jr9k1d1n/Abef:1yJbkwDwVGrabNi8x/WAliqhR1e6ne4
Static task
static1
Behavioral task
behavioral1
Sample
8dd9d34ed5214c42ed9519c724b302a9b6d3232da9fdf947ede7c4a3bb9e8f9e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rita
193.233.20.28:4125
-
auth_value
5cf1bcf41b0a2f3710619223451dfd3a
Targets
-
-
Target
8dd9d34ed5214c42ed9519c724b302a9b6d3232da9fdf947ede7c4a3bb9e8f9e
-
Size
787KB
-
MD5
33e8bb286db4291272b9f0751babdac1
-
SHA1
ee443f9e6f4c9b23033556719c7788d76bbfb4c1
-
SHA256
8dd9d34ed5214c42ed9519c724b302a9b6d3232da9fdf947ede7c4a3bb9e8f9e
-
SHA512
6be95fb629ba798accc1eff1b0fdd539eddddad4aea8914be3fdaa08dab9898a4c03abc907f72bb88fe25b407473fe6aa3f641fd9793e25bb7f9c11f5d698cdd
-
SSDEEP
12288:4Mrdy90Erbo1wUMwXzacGrabNxZSv83B/WAbxnipohcc1c1jr9k1d1n/Abef:1yJbkwDwVGrabNi8x/WAliqhR1e6ne4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-