General
-
Target
ddc1677d108332c9913f38c00947d2f40231ac6b9c7f3a88cc5620cfe3e43e12
-
Size
791KB
-
Sample
230317-cqrwdadg87
-
MD5
d6b2d75a3f5514b8889a33579a0639f4
-
SHA1
b87ddd4f1845ef9eb1f79d28bffba2ea2011f8f9
-
SHA256
ddc1677d108332c9913f38c00947d2f40231ac6b9c7f3a88cc5620cfe3e43e12
-
SHA512
96753d8a0c74a016b1fddc99e165c12ea254df4221330e9bc1af111ab5f712df05351ed17822e62cc7eeeced80516bbeff54359f6857059491625cc8b8ccf386
-
SSDEEP
12288:mMr4y90pvfFzCC05PXSM8vOn+OhIk4EyJa6xBOOGGHU69182K2euOr/mzpE:my6HF6irOnP+REUFU8182gxrB
Static task
static1
Behavioral task
behavioral1
Sample
ddc1677d108332c9913f38c00947d2f40231ac6b9c7f3a88cc5620cfe3e43e12.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Targets
-
-
Target
ddc1677d108332c9913f38c00947d2f40231ac6b9c7f3a88cc5620cfe3e43e12
-
Size
791KB
-
MD5
d6b2d75a3f5514b8889a33579a0639f4
-
SHA1
b87ddd4f1845ef9eb1f79d28bffba2ea2011f8f9
-
SHA256
ddc1677d108332c9913f38c00947d2f40231ac6b9c7f3a88cc5620cfe3e43e12
-
SHA512
96753d8a0c74a016b1fddc99e165c12ea254df4221330e9bc1af111ab5f712df05351ed17822e62cc7eeeced80516bbeff54359f6857059491625cc8b8ccf386
-
SSDEEP
12288:mMr4y90pvfFzCC05PXSM8vOn+OhIk4EyJa6xBOOGGHU69182K2euOr/mzpE:my6HF6irOnP+REUFU8182gxrB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-