General
-
Target
1391bf3b871ca55aaf14191ad8f189ed1ac18c6111c82c16ed71057d0bca923a
-
Size
537KB
-
Sample
230322-hfy5lahc3s
-
MD5
9736d782d62fecac58b8e308d3d3f541
-
SHA1
b2c9ff79812e36396a5d7b3f713c82b2603da556
-
SHA256
1391bf3b871ca55aaf14191ad8f189ed1ac18c6111c82c16ed71057d0bca923a
-
SHA512
76d52138b6329442c28c44cbc3bd4834c6e77485e2d5f080cd3d683c0217e904b41701959d189de1824bd667e5d7d688eb739db8ba81e1486aea54ecf3580fbf
-
SSDEEP
12288:QMrOy90FfAUyiTrdndE5D5DJ1+uFwkzbdVg7aasaBv:OyQ5w55L7wybdVgTsI
Static task
static1
Behavioral task
behavioral1
Sample
1391bf3b871ca55aaf14191ad8f189ed1ac18c6111c82c16ed71057d0bca923a.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Targets
-
-
Target
1391bf3b871ca55aaf14191ad8f189ed1ac18c6111c82c16ed71057d0bca923a
-
Size
537KB
-
MD5
9736d782d62fecac58b8e308d3d3f541
-
SHA1
b2c9ff79812e36396a5d7b3f713c82b2603da556
-
SHA256
1391bf3b871ca55aaf14191ad8f189ed1ac18c6111c82c16ed71057d0bca923a
-
SHA512
76d52138b6329442c28c44cbc3bd4834c6e77485e2d5f080cd3d683c0217e904b41701959d189de1824bd667e5d7d688eb739db8ba81e1486aea54ecf3580fbf
-
SSDEEP
12288:QMrOy90FfAUyiTrdndE5D5DJ1+uFwkzbdVg7aasaBv:OyQ5w55L7wybdVgTsI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-