General
-
Target
0a977009a0c959012fae0d7c819d91a32770a59eb21739ad1366adebb9246f0c
-
Size
791KB
-
Sample
230316-1hhjqsch85
-
MD5
fa952b1d6587d683006286e7830558c7
-
SHA1
67da502b18833357a70e47d30a879a8062a6d3e0
-
SHA256
0a977009a0c959012fae0d7c819d91a32770a59eb21739ad1366adebb9246f0c
-
SHA512
dd9aad3bd25fb4667b7245f48622446a54ab68ecdd6b168507660f128292af887d90d3625f8d5f4f113593c5566b13c05fc064ef8004ccfbfb6810df308fa6b4
-
SSDEEP
12288:pMrZy90puFQxLs6D2/UIDhq8Y0Gchup+rcNGv5w9pu9jhkk3J4N2KA2ygHuB0R:syouF04txq8jeJ9puXk0QA2ygN
Static task
static1
Behavioral task
behavioral1
Sample
0a977009a0c959012fae0d7c819d91a32770a59eb21739ad1366adebb9246f0c.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Targets
-
-
Target
0a977009a0c959012fae0d7c819d91a32770a59eb21739ad1366adebb9246f0c
-
Size
791KB
-
MD5
fa952b1d6587d683006286e7830558c7
-
SHA1
67da502b18833357a70e47d30a879a8062a6d3e0
-
SHA256
0a977009a0c959012fae0d7c819d91a32770a59eb21739ad1366adebb9246f0c
-
SHA512
dd9aad3bd25fb4667b7245f48622446a54ab68ecdd6b168507660f128292af887d90d3625f8d5f4f113593c5566b13c05fc064ef8004ccfbfb6810df308fa6b4
-
SSDEEP
12288:pMrZy90puFQxLs6D2/UIDhq8Y0Gchup+rcNGv5w9pu9jhkk3J4N2KA2ygHuB0R:syouF04txq8jeJ9puXk0QA2ygN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-