General
-
Target
4e97ef3f628a5e8ba46baf97bb9f79a5cc3a4971f9356602f7cc9f5c6b67223e
-
Size
540KB
-
Sample
230322-xvfzwscg3t
-
MD5
f912a4944479b7e6dd94f974aa8b2576
-
SHA1
79b998602b307dbd433a6eee51f6eca7a7a3c20b
-
SHA256
4e97ef3f628a5e8ba46baf97bb9f79a5cc3a4971f9356602f7cc9f5c6b67223e
-
SHA512
ff7f253fb3dfadd1ca1998ec2d6db3c22fba2f44c23dbb6e2d01d853888e0a1add8f3c14d00a6497ccccf02ccb9e7cd1d95b935db0f4833d4d2e142403d74f50
-
SSDEEP
12288:KMrvy90dWjU9PoQE532z7z70VxKCohn8PLjXL:5yo/d02z7zoVQ9SLH
Static task
static1
Behavioral task
behavioral1
Sample
4e97ef3f628a5e8ba46baf97bb9f79a5cc3a4971f9356602f7cc9f5c6b67223e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
sint
193.233.20.31:4125
-
auth_value
9d9b763b4dcfbff1c06ef4743cc0399e
Targets
-
-
Target
4e97ef3f628a5e8ba46baf97bb9f79a5cc3a4971f9356602f7cc9f5c6b67223e
-
Size
540KB
-
MD5
f912a4944479b7e6dd94f974aa8b2576
-
SHA1
79b998602b307dbd433a6eee51f6eca7a7a3c20b
-
SHA256
4e97ef3f628a5e8ba46baf97bb9f79a5cc3a4971f9356602f7cc9f5c6b67223e
-
SHA512
ff7f253fb3dfadd1ca1998ec2d6db3c22fba2f44c23dbb6e2d01d853888e0a1add8f3c14d00a6497ccccf02ccb9e7cd1d95b935db0f4833d4d2e142403d74f50
-
SSDEEP
12288:KMrvy90dWjU9PoQE532z7z70VxKCohn8PLjXL:5yo/d02z7zoVQ9SLH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-