General
-
Target
5fd5bbce51a8e1b9938fc5fbe77acfbd2ee0e6c13c34b172be77f719e14a6f1f
-
Size
530KB
-
Sample
230322-b3xfyseb94
-
MD5
014fbf8d1e8bcfa2fe1837e3ed5b6a1d
-
SHA1
de579798f4e172b0717b9d2fa66ac8a1fd93c98c
-
SHA256
5fd5bbce51a8e1b9938fc5fbe77acfbd2ee0e6c13c34b172be77f719e14a6f1f
-
SHA512
a9a67cc78d6119a6b605a1b082130efcddcdad9cfa6b96d7d976020ac2774edb6ee55a14a04002666dab0ce4772900b59e71ca697eb2281f3b0bc450329c7b75
-
SSDEEP
12288:pMr0y90gJUzJFXkQryG2c+2vnVBcAb9aABrD9rFnh:dyzJUzJF2IfTb9aUvh
Static task
static1
Behavioral task
behavioral1
Sample
5fd5bbce51a8e1b9938fc5fbe77acfbd2ee0e6c13c34b172be77f719e14a6f1f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Targets
-
-
Target
5fd5bbce51a8e1b9938fc5fbe77acfbd2ee0e6c13c34b172be77f719e14a6f1f
-
Size
530KB
-
MD5
014fbf8d1e8bcfa2fe1837e3ed5b6a1d
-
SHA1
de579798f4e172b0717b9d2fa66ac8a1fd93c98c
-
SHA256
5fd5bbce51a8e1b9938fc5fbe77acfbd2ee0e6c13c34b172be77f719e14a6f1f
-
SHA512
a9a67cc78d6119a6b605a1b082130efcddcdad9cfa6b96d7d976020ac2774edb6ee55a14a04002666dab0ce4772900b59e71ca697eb2281f3b0bc450329c7b75
-
SSDEEP
12288:pMr0y90gJUzJFXkQryG2c+2vnVBcAb9aABrD9rFnh:dyzJUzJF2IfTb9aUvh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-