General
-
Target
0b4eb0c6aefe00b35934b7f59add1be10c677a7f709bf5c757a98b4cc6f5bb9b
-
Size
874KB
-
Sample
230315-lhxlbsee4v
-
MD5
7ded5d80c5cc3828a1c5e738adf91c6a
-
SHA1
5f4cc1818e8b27f6fedf514dfdffe4bb170a5cdf
-
SHA256
0b4eb0c6aefe00b35934b7f59add1be10c677a7f709bf5c757a98b4cc6f5bb9b
-
SHA512
d666a4061e3258b038b4457947772704a5b53ddaf89bea358d708a6f3ec537cc0e938b1065ee388d6352b0c450c1af5aed82ac633c20307800e04318275a5dec
-
SSDEEP
24576:uySlY/K84OrRWujioAFFfB3WhTcAgmPGwqBB8:9v31EujOBawFw
Static task
static1
Behavioral task
behavioral1
Sample
0b4eb0c6aefe00b35934b7f59add1be10c677a7f709bf5c757a98b4cc6f5bb9b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rita
193.233.20.28:4125
-
auth_value
5cf1bcf41b0a2f3710619223451dfd3a
Targets
-
-
Target
0b4eb0c6aefe00b35934b7f59add1be10c677a7f709bf5c757a98b4cc6f5bb9b
-
Size
874KB
-
MD5
7ded5d80c5cc3828a1c5e738adf91c6a
-
SHA1
5f4cc1818e8b27f6fedf514dfdffe4bb170a5cdf
-
SHA256
0b4eb0c6aefe00b35934b7f59add1be10c677a7f709bf5c757a98b4cc6f5bb9b
-
SHA512
d666a4061e3258b038b4457947772704a5b53ddaf89bea358d708a6f3ec537cc0e938b1065ee388d6352b0c450c1af5aed82ac633c20307800e04318275a5dec
-
SSDEEP
24576:uySlY/K84OrRWujioAFFfB3WhTcAgmPGwqBB8:9v31EujOBawFw
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-