General
-
Target
99b448dfb6826e49a37aad12bb7496bfe3541f6b291990fe4303080afeed4b3a
-
Size
538KB
-
Sample
230322-w6eqjaaf49
-
MD5
e3fd2f4b7a8ca5eee949008ddfa43a90
-
SHA1
1a2ed689b1b6360db2b230be7538874a92726e98
-
SHA256
99b448dfb6826e49a37aad12bb7496bfe3541f6b291990fe4303080afeed4b3a
-
SHA512
57796568f02a7d5473553a1594aa4d369558ed0ea18a387ad068ee362e3104fba20e8af272e14aa30197e91deab59eebee7489b18af6d016b102238ed78bbb5d
-
SSDEEP
12288:FMrsy90qG3/l8ReclHHb1L997K+AwYv1M9l0oZsDkNv:By7G3/l8PlH71Lidnv1Ql0oSkNv
Static task
static1
Behavioral task
behavioral1
Sample
99b448dfb6826e49a37aad12bb7496bfe3541f6b291990fe4303080afeed4b3a.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Targets
-
-
Target
99b448dfb6826e49a37aad12bb7496bfe3541f6b291990fe4303080afeed4b3a
-
Size
538KB
-
MD5
e3fd2f4b7a8ca5eee949008ddfa43a90
-
SHA1
1a2ed689b1b6360db2b230be7538874a92726e98
-
SHA256
99b448dfb6826e49a37aad12bb7496bfe3541f6b291990fe4303080afeed4b3a
-
SHA512
57796568f02a7d5473553a1594aa4d369558ed0ea18a387ad068ee362e3104fba20e8af272e14aa30197e91deab59eebee7489b18af6d016b102238ed78bbb5d
-
SSDEEP
12288:FMrsy90qG3/l8ReclHHb1L997K+AwYv1M9l0oZsDkNv:By7G3/l8PlH71Lidnv1Ql0oSkNv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-