General
-
Target
a54902e711d9d6a8379fe44248afd8003f567a6361d409a0c02dad065bbce761
-
Size
894KB
-
Sample
230316-artp9aga89
-
MD5
8add143420ae44f6d1fb48ddf5aeea18
-
SHA1
196b5b7d305e5eb3b7a0f30e566df6b03261accf
-
SHA256
a54902e711d9d6a8379fe44248afd8003f567a6361d409a0c02dad065bbce761
-
SHA512
139e772d947e7a81088d14a3afc18701009798463ff95dc2fe8741c4e80adf32cbfdc0e1deee458267e91f1fa12d8aaac49cb69a3c5218d3d5305bc27a419223
-
SSDEEP
24576:Oy1lgn8YkdDVa2S6IJtZR1SR26+atD4Exf:d16/khVHrIJtZik1aSEx
Static task
static1
Behavioral task
behavioral1
Sample
a54902e711d9d6a8379fe44248afd8003f567a6361d409a0c02dad065bbce761.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Targets
-
-
Target
a54902e711d9d6a8379fe44248afd8003f567a6361d409a0c02dad065bbce761
-
Size
894KB
-
MD5
8add143420ae44f6d1fb48ddf5aeea18
-
SHA1
196b5b7d305e5eb3b7a0f30e566df6b03261accf
-
SHA256
a54902e711d9d6a8379fe44248afd8003f567a6361d409a0c02dad065bbce761
-
SHA512
139e772d947e7a81088d14a3afc18701009798463ff95dc2fe8741c4e80adf32cbfdc0e1deee458267e91f1fa12d8aaac49cb69a3c5218d3d5305bc27a419223
-
SSDEEP
24576:Oy1lgn8YkdDVa2S6IJtZR1SR26+atD4Exf:d16/khVHrIJtZik1aSEx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-