General
-
Target
be18ae2e0cbcec92fa565024c4021d412a2d382431138f1d5bc9ba7bfe9dd405
-
Size
536KB
-
Sample
230322-vgpzjaab89
-
MD5
4401ae4ea94cf598e4824481ff0886e7
-
SHA1
b729c6c5450fa90c22e42a185bd81f85db34c647
-
SHA256
be18ae2e0cbcec92fa565024c4021d412a2d382431138f1d5bc9ba7bfe9dd405
-
SHA512
22e4a5c224b83ecc3f6946f9070c55f297787f52b0164ba4788efe552c1723701c66a5bce8bff638281836a88f4043bc6c1e6d81421ce830f2e40e18e75e0862
-
SSDEEP
12288:xMray902mCc9GYs6OLaVq8TBLz0BgZkUrlGFlfEgB:Ly8R9GYrOLaZBz0XU5GFlDB
Static task
static1
Behavioral task
behavioral1
Sample
be18ae2e0cbcec92fa565024c4021d412a2d382431138f1d5bc9ba7bfe9dd405.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Targets
-
-
Target
be18ae2e0cbcec92fa565024c4021d412a2d382431138f1d5bc9ba7bfe9dd405
-
Size
536KB
-
MD5
4401ae4ea94cf598e4824481ff0886e7
-
SHA1
b729c6c5450fa90c22e42a185bd81f85db34c647
-
SHA256
be18ae2e0cbcec92fa565024c4021d412a2d382431138f1d5bc9ba7bfe9dd405
-
SHA512
22e4a5c224b83ecc3f6946f9070c55f297787f52b0164ba4788efe552c1723701c66a5bce8bff638281836a88f4043bc6c1e6d81421ce830f2e40e18e75e0862
-
SSDEEP
12288:xMray902mCc9GYs6OLaVq8TBLz0BgZkUrlGFlfEgB:Ly8R9GYrOLaZBz0XU5GFlDB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-