General
-
Target
5cb0c40d54ef6840398edbf7715916b3b67be09ba00757bb01c9f137401aa648
-
Size
192KB
-
Sample
230322-b2zvpagb8v
-
MD5
02e9810537ae8a25cec5c5d8beed2be3
-
SHA1
1ba79b4c015c40cb8d95fa43a6cec2e1a0a7807c
-
SHA256
5cb0c40d54ef6840398edbf7715916b3b67be09ba00757bb01c9f137401aa648
-
SHA512
99acbfd2ce632a6ff8affc8bf5a695dd70c49bec59aa31cc1802f007a7978b4a6d1ea194d5065073da64be136fed0226942c47ba73f48aa9fb84e3ac7fd5ddd4
-
SSDEEP
3072:Kmy+bnr+O1j5GWp1icKAArDZz4N9GhbkrNEk1GTEqTuBppc2FLo7:Kmy+bnr+op0yN90QEH6Brhy
Static task
static1
Behavioral task
behavioral1
Sample
5cb0c40d54ef6840398edbf7715916b3b67be09ba00757bb01c9f137401aa648.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Targets
-
-
Target
5cb0c40d54ef6840398edbf7715916b3b67be09ba00757bb01c9f137401aa648
-
Size
192KB
-
MD5
02e9810537ae8a25cec5c5d8beed2be3
-
SHA1
1ba79b4c015c40cb8d95fa43a6cec2e1a0a7807c
-
SHA256
5cb0c40d54ef6840398edbf7715916b3b67be09ba00757bb01c9f137401aa648
-
SHA512
99acbfd2ce632a6ff8affc8bf5a695dd70c49bec59aa31cc1802f007a7978b4a6d1ea194d5065073da64be136fed0226942c47ba73f48aa9fb84e3ac7fd5ddd4
-
SSDEEP
3072:Kmy+bnr+O1j5GWp1icKAArDZz4N9GhbkrNEk1GTEqTuBppc2FLo7:Kmy+bnr+op0yN90QEH6Brhy
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-