General
-
Target
03d0f4853b3cbd51caed21cd4d869486270ea836a013f6032ef7263d41a3bc2b
-
Size
861KB
-
Sample
230317-kt49wafc55
-
MD5
b60f535525b5d8e6699ea083565b09c6
-
SHA1
ded078c0e0ac9073772494a908f9b2be3f3118de
-
SHA256
03d0f4853b3cbd51caed21cd4d869486270ea836a013f6032ef7263d41a3bc2b
-
SHA512
a2904120ad8f52b0906d943b4bfc9ecaa8ccb421466cf442308f8b4d5ca1211ae871b37cb4ebfee7d0e980cf25af636e0364209eef63320e42b637bd656d5c30
-
SSDEEP
24576:1ysDmqDPn5AVb2VyKp3RaX7u7nsTmhn9CK:QsiqDn5o2VT3Rai8mhE
Static task
static1
Behavioral task
behavioral1
Sample
03d0f4853b3cbd51caed21cd4d869486270ea836a013f6032ef7263d41a3bc2b.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Targets
-
-
Target
03d0f4853b3cbd51caed21cd4d869486270ea836a013f6032ef7263d41a3bc2b
-
Size
861KB
-
MD5
b60f535525b5d8e6699ea083565b09c6
-
SHA1
ded078c0e0ac9073772494a908f9b2be3f3118de
-
SHA256
03d0f4853b3cbd51caed21cd4d869486270ea836a013f6032ef7263d41a3bc2b
-
SHA512
a2904120ad8f52b0906d943b4bfc9ecaa8ccb421466cf442308f8b4d5ca1211ae871b37cb4ebfee7d0e980cf25af636e0364209eef63320e42b637bd656d5c30
-
SSDEEP
24576:1ysDmqDPn5AVb2VyKp3RaX7u7nsTmhn9CK:QsiqDn5o2VT3Rai8mhE
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-