General
-
Target
e44975a228baedefd948314ab28cd1fde2e4d4a486bff42d93da7a953086ff93
-
Size
894KB
-
Sample
230316-b3x3gsaf51
-
MD5
c62e3aeaaf1dddc3ddacd21ad5d77fef
-
SHA1
224b06a69cb52f6ecac9a6fd4a2ae606dc0ad1f6
-
SHA256
e44975a228baedefd948314ab28cd1fde2e4d4a486bff42d93da7a953086ff93
-
SHA512
97ee057c78cffcedd450dcae58b5e0d5bec71cc0511f303f923300f3b2621753a514d2552659e15684f1dcb20f11e08ccec4029ac34feb61423b5044bac92445
-
SSDEEP
24576:RyAVAAikU8+3zkeG7P98aQQ4Ocat/mgIJQ:EAKWMjGpEa
Static task
static1
Behavioral task
behavioral1
Sample
e44975a228baedefd948314ab28cd1fde2e4d4a486bff42d93da7a953086ff93.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Targets
-
-
Target
e44975a228baedefd948314ab28cd1fde2e4d4a486bff42d93da7a953086ff93
-
Size
894KB
-
MD5
c62e3aeaaf1dddc3ddacd21ad5d77fef
-
SHA1
224b06a69cb52f6ecac9a6fd4a2ae606dc0ad1f6
-
SHA256
e44975a228baedefd948314ab28cd1fde2e4d4a486bff42d93da7a953086ff93
-
SHA512
97ee057c78cffcedd450dcae58b5e0d5bec71cc0511f303f923300f3b2621753a514d2552659e15684f1dcb20f11e08ccec4029ac34feb61423b5044bac92445
-
SSDEEP
24576:RyAVAAikU8+3zkeG7P98aQQ4Ocat/mgIJQ:EAKWMjGpEa
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-