General
-
Target
3f5f262137ca0b29ad795abbd8ae5da5bfc7f9b8aff99cef55aef02ab964bdc6
-
Size
667KB
-
Sample
230316-17j4vsfc6v
-
MD5
60e8e3446f839ebb4ac5f972287b8d14
-
SHA1
605e8e9a7dea65744b4f07a7176932758d74f895
-
SHA256
3f5f262137ca0b29ad795abbd8ae5da5bfc7f9b8aff99cef55aef02ab964bdc6
-
SHA512
c77852d1d53cb9f274c82f8c59a3fc6a3a186054eda8f41d22846727f55d50551d7600585bd3f8eb55fffea82447f29cacf06827a06c8af535d49f14727ee780
-
SSDEEP
12288:NMr2y90SDPfdTFIYQID2h9G1k/6w50wDWkYa/Cte65sLv5D5YIgrzk0PcNKFteoU:LyF3JFFQbSk/6ifFYa6tH5sLvFjapPUv
Static task
static1
Behavioral task
behavioral1
Sample
3f5f262137ca0b29ad795abbd8ae5da5bfc7f9b8aff99cef55aef02ab964bdc6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3f5f262137ca0b29ad795abbd8ae5da5bfc7f9b8aff99cef55aef02ab964bdc6.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
well
193.233.20.28:4125
-
auth_value
265e7373dd436339d88347c08a10b402
Targets
-
-
Target
3f5f262137ca0b29ad795abbd8ae5da5bfc7f9b8aff99cef55aef02ab964bdc6
-
Size
667KB
-
MD5
60e8e3446f839ebb4ac5f972287b8d14
-
SHA1
605e8e9a7dea65744b4f07a7176932758d74f895
-
SHA256
3f5f262137ca0b29ad795abbd8ae5da5bfc7f9b8aff99cef55aef02ab964bdc6
-
SHA512
c77852d1d53cb9f274c82f8c59a3fc6a3a186054eda8f41d22846727f55d50551d7600585bd3f8eb55fffea82447f29cacf06827a06c8af535d49f14727ee780
-
SSDEEP
12288:NMr2y90SDPfdTFIYQID2h9G1k/6w50wDWkYa/Cte65sLv5D5YIgrzk0PcNKFteoU:LyF3JFFQbSk/6ifFYa6tH5sLvFjapPUv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-