General
-
Target
9b3292499f06dfce00c9bfbef1200b79c76f1ca3c105ee975cb179347f8d62b8
-
Size
894KB
-
Sample
230316-b9f3jsgd52
-
MD5
bac7cb5c1492839b35fe0a603588373d
-
SHA1
40d9c33f0db5bd665cfe7e9d752c1897cb6934d2
-
SHA256
9b3292499f06dfce00c9bfbef1200b79c76f1ca3c105ee975cb179347f8d62b8
-
SHA512
ac2e18760102353afd6c6ab434a1b57c656b21ffb69344bacf72be784730890acf6a7aecfd04a48154ebfe18e90dcc1ab40ae5dfe46e03ebbdb710cbf863b6db
-
SSDEEP
12288:3MrYy90O77tWEn0rF2+N/i1NpLF385MnO6aBcvus3VMJXdRIXDZHFCN/daXmzkdl:Pyj7Ubx/ClUkoa2s3VYfataYtVbhT
Static task
static1
Behavioral task
behavioral1
Sample
9b3292499f06dfce00c9bfbef1200b79c76f1ca3c105ee975cb179347f8d62b8.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Targets
-
-
Target
9b3292499f06dfce00c9bfbef1200b79c76f1ca3c105ee975cb179347f8d62b8
-
Size
894KB
-
MD5
bac7cb5c1492839b35fe0a603588373d
-
SHA1
40d9c33f0db5bd665cfe7e9d752c1897cb6934d2
-
SHA256
9b3292499f06dfce00c9bfbef1200b79c76f1ca3c105ee975cb179347f8d62b8
-
SHA512
ac2e18760102353afd6c6ab434a1b57c656b21ffb69344bacf72be784730890acf6a7aecfd04a48154ebfe18e90dcc1ab40ae5dfe46e03ebbdb710cbf863b6db
-
SSDEEP
12288:3MrYy90O77tWEn0rF2+N/i1NpLF385MnO6aBcvus3VMJXdRIXDZHFCN/daXmzkdl:Pyj7Ubx/ClUkoa2s3VYfataYtVbhT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-