General
-
Target
546b8ceb769c1706ec14f0717163450166d8d268972014add44ddc6f9d341ded
-
Size
787KB
-
Sample
230316-jmxe1shg62
-
MD5
fb5bc7febdfdfd91c438f80a34655878
-
SHA1
1327c9b29c84a6ee1c4bb62406d4d96722229ce8
-
SHA256
546b8ceb769c1706ec14f0717163450166d8d268972014add44ddc6f9d341ded
-
SHA512
ab8744e0d93bfd898bf9485d3d3e02d814cc3497562724e196e0e9e7b9e4bb140c65c7d423b56bb27839f23e3d2f91f37e8bfb996ddbafa927d7e872dcc4a06d
-
SSDEEP
12288:OMrJy904IeZyLm0QvqbTFV7QEg+r2VI6gZGC4BFn5V2y9haeRCRKcC2KV:/yrwX15nLsI6govHnBseARKb
Static task
static1
Behavioral task
behavioral1
Sample
546b8ceb769c1706ec14f0717163450166d8d268972014add44ddc6f9d341ded.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Targets
-
-
Target
546b8ceb769c1706ec14f0717163450166d8d268972014add44ddc6f9d341ded
-
Size
787KB
-
MD5
fb5bc7febdfdfd91c438f80a34655878
-
SHA1
1327c9b29c84a6ee1c4bb62406d4d96722229ce8
-
SHA256
546b8ceb769c1706ec14f0717163450166d8d268972014add44ddc6f9d341ded
-
SHA512
ab8744e0d93bfd898bf9485d3d3e02d814cc3497562724e196e0e9e7b9e4bb140c65c7d423b56bb27839f23e3d2f91f37e8bfb996ddbafa927d7e872dcc4a06d
-
SSDEEP
12288:OMrJy904IeZyLm0QvqbTFV7QEg+r2VI6gZGC4BFn5V2y9haeRCRKcC2KV:/yrwX15nLsI6govHnBseARKb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-