General
-
Target
820c0e8f61f46a8c03121d326c56773bbfd4e792e5edd08d2bce083bf7939e9d
-
Size
793KB
-
Sample
230316-tww6qaea9s
-
MD5
7ee9c2380480ffdd060c5a0660870ef7
-
SHA1
05ce1ba13ca70f4f6778c5bcb5dc918970c59e83
-
SHA256
820c0e8f61f46a8c03121d326c56773bbfd4e792e5edd08d2bce083bf7939e9d
-
SHA512
989ebc3b36bfdf7abab5c525978506353418e6713d786875f5c29aa73fdb49b321d83fe3be94206471fb2f4e1c04ca6279f5377973a252c860b80d92c89c60f5
-
SSDEEP
12288:9MrMy907uVLsOw0UVZ5Aai8jsEmY/aM75M+v0vzovlCHQMA/9PkJuD4N:Zy9VLNW59i2sE7z75M6ZvlcQF/98J9
Static task
static1
Behavioral task
behavioral1
Sample
820c0e8f61f46a8c03121d326c56773bbfd4e792e5edd08d2bce083bf7939e9d.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rako
193.233.20.28:4125
-
auth_value
69e2d139981e0b037a6786e01a92824d
Targets
-
-
Target
820c0e8f61f46a8c03121d326c56773bbfd4e792e5edd08d2bce083bf7939e9d
-
Size
793KB
-
MD5
7ee9c2380480ffdd060c5a0660870ef7
-
SHA1
05ce1ba13ca70f4f6778c5bcb5dc918970c59e83
-
SHA256
820c0e8f61f46a8c03121d326c56773bbfd4e792e5edd08d2bce083bf7939e9d
-
SHA512
989ebc3b36bfdf7abab5c525978506353418e6713d786875f5c29aa73fdb49b321d83fe3be94206471fb2f4e1c04ca6279f5377973a252c860b80d92c89c60f5
-
SSDEEP
12288:9MrMy907uVLsOw0UVZ5Aai8jsEmY/aM75M+v0vzovlCHQMA/9PkJuD4N:Zy9VLNW59i2sE7z75M6ZvlcQF/98J9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-