General
-
Target
2c5b813b6bfab5ea227b4015854b1bf397eff516a627ef47422ef27e798c5a23
-
Size
876KB
-
Sample
230315-jsvtdacb75
-
MD5
f6e30d8f6312ea12122aee11cce8ca88
-
SHA1
ed0e62556ffa223aa42aa90532bc74d123093795
-
SHA256
2c5b813b6bfab5ea227b4015854b1bf397eff516a627ef47422ef27e798c5a23
-
SHA512
d4f5ebdf1903ca551e4615f7d51a465d4baf1df316831acfa323e415a4f45b892519bdb8f4a075d0ce413668721f5be0b69b03f2e25b14bd214f291992e92007
-
SSDEEP
24576:uyK+nnHptQNO73qK0i87oVa0UuxWRwK/Mj+9j:9vnJtQU7axPs1/WRwOMS
Static task
static1
Behavioral task
behavioral1
Sample
2c5b813b6bfab5ea227b4015854b1bf397eff516a627ef47422ef27e798c5a23.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rita
193.233.20.28:4125
-
auth_value
5cf1bcf41b0a2f3710619223451dfd3a
Targets
-
-
Target
2c5b813b6bfab5ea227b4015854b1bf397eff516a627ef47422ef27e798c5a23
-
Size
876KB
-
MD5
f6e30d8f6312ea12122aee11cce8ca88
-
SHA1
ed0e62556ffa223aa42aa90532bc74d123093795
-
SHA256
2c5b813b6bfab5ea227b4015854b1bf397eff516a627ef47422ef27e798c5a23
-
SHA512
d4f5ebdf1903ca551e4615f7d51a465d4baf1df316831acfa323e415a4f45b892519bdb8f4a075d0ce413668721f5be0b69b03f2e25b14bd214f291992e92007
-
SSDEEP
24576:uyK+nnHptQNO73qK0i87oVa0UuxWRwK/Mj+9j:9vnJtQU7axPs1/WRwOMS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-