General
-
Target
9339b67d08db1a529dc7f5a5d637b6821fe94a78003946ab94f9fb8b47dff0ff
-
Size
864KB
-
Sample
230315-s5gxqagb91
-
MD5
ea38df8f0c0b6dbafffb5f5babf8572c
-
SHA1
cdd1f61a46e7ec10917cbb199648bf54fe3e8856
-
SHA256
9339b67d08db1a529dc7f5a5d637b6821fe94a78003946ab94f9fb8b47dff0ff
-
SHA512
e2a607f1f148aec493fbdb4f027b682b0463d523a9f3a7a06aac362377e40a30d800376428ad0a9223a65f1094442958436942e89cce589ab2267c5729ff7917
-
SSDEEP
12288:AMrey909I5oB6wbE3nwLTPZxIhFhz2O77R0Ax7yMKGSGHYeXTlN24St5HXQh7aR:uyFixE3wncFF9XcGSGTXpN24C5AC
Static task
static1
Behavioral task
behavioral1
Sample
9339b67d08db1a529dc7f5a5d637b6821fe94a78003946ab94f9fb8b47dff0ff.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Targets
-
-
Target
9339b67d08db1a529dc7f5a5d637b6821fe94a78003946ab94f9fb8b47dff0ff
-
Size
864KB
-
MD5
ea38df8f0c0b6dbafffb5f5babf8572c
-
SHA1
cdd1f61a46e7ec10917cbb199648bf54fe3e8856
-
SHA256
9339b67d08db1a529dc7f5a5d637b6821fe94a78003946ab94f9fb8b47dff0ff
-
SHA512
e2a607f1f148aec493fbdb4f027b682b0463d523a9f3a7a06aac362377e40a30d800376428ad0a9223a65f1094442958436942e89cce589ab2267c5729ff7917
-
SSDEEP
12288:AMrey909I5oB6wbE3nwLTPZxIhFhz2O77R0Ax7yMKGSGHYeXTlN24St5HXQh7aR:uyFixE3wncFF9XcGSGTXpN24C5AC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-