General
-
Target
6cfe5c93bbfde13f08bb1b2fd6bd0fc0f3de58a17a0bfc4a970f51afb8964b16
-
Size
822KB
-
Sample
230322-1q5dgade8y
-
MD5
a5fb671b9ebb83def9c64acbb38179cb
-
SHA1
bb7d062c9344390db84964835d5f4bea27d92428
-
SHA256
6cfe5c93bbfde13f08bb1b2fd6bd0fc0f3de58a17a0bfc4a970f51afb8964b16
-
SHA512
394c4956f5a43ba691d3a5b62ff2fd6790b031be917fabd6d29a063da6d4f20849fb6ed54b9420ed1dc97da7443c8cd005f7c345cfc108e71a2121ad81d78950
-
SSDEEP
12288:3Hb7pumoYIeAeu6ns+GCu8/Bx7TvkC/4hNdUy9EuZdkRCvRk:3cmoJlGtGp8ZxvkC/4hXU8EnRX
Static task
static1
Behavioral task
behavioral1
Sample
6cfe5c93bbfde13f08bb1b2fd6bd0fc0f3de58a17a0bfc4a970f51afb8964b16.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Targets
-
-
Target
6cfe5c93bbfde13f08bb1b2fd6bd0fc0f3de58a17a0bfc4a970f51afb8964b16
-
Size
822KB
-
MD5
a5fb671b9ebb83def9c64acbb38179cb
-
SHA1
bb7d062c9344390db84964835d5f4bea27d92428
-
SHA256
6cfe5c93bbfde13f08bb1b2fd6bd0fc0f3de58a17a0bfc4a970f51afb8964b16
-
SHA512
394c4956f5a43ba691d3a5b62ff2fd6790b031be917fabd6d29a063da6d4f20849fb6ed54b9420ed1dc97da7443c8cd005f7c345cfc108e71a2121ad81d78950
-
SSDEEP
12288:3Hb7pumoYIeAeu6ns+GCu8/Bx7TvkC/4hNdUy9EuZdkRCvRk:3cmoJlGtGp8ZxvkC/4hXU8EnRX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-