General
-
Target
c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85
-
Size
895KB
-
Sample
230316-ajfhnaac91
-
MD5
92292ae32d5bc0f563806bebde590945
-
SHA1
6cb0d54c0d1547ccfbf46ca928499a1907963f21
-
SHA256
c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85
-
SHA512
69c2120baddda6d3525096ade32937823a498c5a9ad9d8809f77cfd304fa4cf87f3053b2793c4a185263bbdb05d4224470cee6d3a830134df21ed0b2b18d06ab
-
SSDEEP
24576:8ycoXlS0wPCedav90AAY74FmfJWlata8:rcoXlS0URda1774FwWla4
Static task
static1
Behavioral task
behavioral1
Sample
c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Targets
-
-
Target
c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85
-
Size
895KB
-
MD5
92292ae32d5bc0f563806bebde590945
-
SHA1
6cb0d54c0d1547ccfbf46ca928499a1907963f21
-
SHA256
c95dcc127582e2813d1cbb9ab6a0cc544bef4e21bef42b1db6977c14844efc85
-
SHA512
69c2120baddda6d3525096ade32937823a498c5a9ad9d8809f77cfd304fa4cf87f3053b2793c4a185263bbdb05d4224470cee6d3a830134df21ed0b2b18d06ab
-
SSDEEP
24576:8ycoXlS0wPCedav90AAY74FmfJWlata8:rcoXlS0URda1774FwWla4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-