General
-
Target
ab2e1a38b954b8869e9527d3279e2a7dfd6c0533f2e280801a37eba6143520be
-
Size
864KB
-
Sample
230315-sw9alsdh98
-
MD5
23d9c4e1f9a78b1a72a39748ef4a2019
-
SHA1
789c420acdc6e147128fee8521b79e351f8293a6
-
SHA256
ab2e1a38b954b8869e9527d3279e2a7dfd6c0533f2e280801a37eba6143520be
-
SHA512
519f1d4d6fed2c7d492713523ae6c378b9a6410a36873f225c920dc371ddae89a09774913adb1ee61699da24f957ad1621503148d177e5ba739b71f56b5f276d
-
SSDEEP
24576:7y0A+40IMBqTEtIg1iLTXpQNby65YO9S:u0f4071IhCNG
Static task
static1
Behavioral task
behavioral1
Sample
ab2e1a38b954b8869e9527d3279e2a7dfd6c0533f2e280801a37eba6143520be.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Targets
-
-
Target
ab2e1a38b954b8869e9527d3279e2a7dfd6c0533f2e280801a37eba6143520be
-
Size
864KB
-
MD5
23d9c4e1f9a78b1a72a39748ef4a2019
-
SHA1
789c420acdc6e147128fee8521b79e351f8293a6
-
SHA256
ab2e1a38b954b8869e9527d3279e2a7dfd6c0533f2e280801a37eba6143520be
-
SHA512
519f1d4d6fed2c7d492713523ae6c378b9a6410a36873f225c920dc371ddae89a09774913adb1ee61699da24f957ad1621503148d177e5ba739b71f56b5f276d
-
SSDEEP
24576:7y0A+40IMBqTEtIg1iLTXpQNby65YO9S:u0f4071IhCNG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-