General
-
Target
7ea5202a68b30b43f67be18c138a81a26c6ff62dfedc2f80d6c6d102e6ed7e50
-
Size
667KB
-
Sample
230315-fq6lbabf46
-
MD5
d773af96122baacc61fbe2325e248cf3
-
SHA1
9ebc5ff308b515d61ab74297297b830e54e6a168
-
SHA256
7ea5202a68b30b43f67be18c138a81a26c6ff62dfedc2f80d6c6d102e6ed7e50
-
SHA512
b486345f1d2a7c17666ca645c31fd1d7898182e5272e628aa297ab185b5f32d8289619d8cc551cfa237a38a43b7a7cc47fd9f62114085e8404fe3d8f984687f5
-
SSDEEP
12288:yMrjy90uOcoVZ7/Y60KBpiHg9PKaN9/Hsdh+CdQMnRj6Yn5U6:5y7OZV5d7BgHyKmkZQMnt6Yn7
Static task
static1
Behavioral task
behavioral1
Sample
7ea5202a68b30b43f67be18c138a81a26c6ff62dfedc2f80d6c6d102e6ed7e50.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7ea5202a68b30b43f67be18c138a81a26c6ff62dfedc2f80d6c6d102e6ed7e50.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
gonna
193.56.146.220:4174
-
auth_value
10ce5127fa09a5422f1a407fb6a7c077
Targets
-
-
Target
7ea5202a68b30b43f67be18c138a81a26c6ff62dfedc2f80d6c6d102e6ed7e50
-
Size
667KB
-
MD5
d773af96122baacc61fbe2325e248cf3
-
SHA1
9ebc5ff308b515d61ab74297297b830e54e6a168
-
SHA256
7ea5202a68b30b43f67be18c138a81a26c6ff62dfedc2f80d6c6d102e6ed7e50
-
SHA512
b486345f1d2a7c17666ca645c31fd1d7898182e5272e628aa297ab185b5f32d8289619d8cc551cfa237a38a43b7a7cc47fd9f62114085e8404fe3d8f984687f5
-
SSDEEP
12288:yMrjy90uOcoVZ7/Y60KBpiHg9PKaN9/Hsdh+CdQMnRj6Yn5U6:5y7OZV5d7BgHyKmkZQMnt6Yn7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-