General
-
Target
5703d22b9e46ce7aad22f461251e025b6e09755ceb54c186856c49ef28567e56
-
Size
537KB
-
Sample
230322-nbes2sad4z
-
MD5
6aaad12b3961609fdf2574a8ace3b7b7
-
SHA1
2415acf6a9aa3c7d09c099af110e186c50e68cdf
-
SHA256
5703d22b9e46ce7aad22f461251e025b6e09755ceb54c186856c49ef28567e56
-
SHA512
9f6b8be8739158a19e5afc15dc2c5a5aad4849fb1ac17aaa092120bf9665d4d4e22393d4e3a9226ce13bbf3813cb209a32c397b11abc38f3420d2cd3bd033637
-
SSDEEP
12288:5Mr0y906nBxtxAlBaIpCIpjZB6xp9AvDigrbPn:tyPLbAlBzr2p9AvG2n
Static task
static1
Behavioral task
behavioral1
Sample
5703d22b9e46ce7aad22f461251e025b6e09755ceb54c186856c49ef28567e56.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Targets
-
-
Target
5703d22b9e46ce7aad22f461251e025b6e09755ceb54c186856c49ef28567e56
-
Size
537KB
-
MD5
6aaad12b3961609fdf2574a8ace3b7b7
-
SHA1
2415acf6a9aa3c7d09c099af110e186c50e68cdf
-
SHA256
5703d22b9e46ce7aad22f461251e025b6e09755ceb54c186856c49ef28567e56
-
SHA512
9f6b8be8739158a19e5afc15dc2c5a5aad4849fb1ac17aaa092120bf9665d4d4e22393d4e3a9226ce13bbf3813cb209a32c397b11abc38f3420d2cd3bd033637
-
SSDEEP
12288:5Mr0y906nBxtxAlBaIpCIpjZB6xp9AvDigrbPn:tyPLbAlBzr2p9AvG2n
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-