General
-
Target
15693137d4e2786b2117bd35ce6051968bd06b5b5bcd64e947ef6eace0834b82
-
Size
540KB
-
Sample
230322-xxejvacg4x
-
MD5
0c20cf414b1223fad681a0b21e3c6e47
-
SHA1
62f785406ac96ffb81e0446e2d01df31457c971f
-
SHA256
15693137d4e2786b2117bd35ce6051968bd06b5b5bcd64e947ef6eace0834b82
-
SHA512
9251def385b6fc07aacbdea01024d766170f9c4dfdb0dd7be2da198fb4ab934145cca6cc25f8f7c2dbf120803cda613221e90c957a5e8bf5240b1e0a5ff623d8
-
SSDEEP
12288:KMrky90JSIeET4xQy/qwI52aOj7GZ0uj3TK7fOWr0X:iywSZ1qJ57Oj7GO57f8
Static task
static1
Behavioral task
behavioral1
Sample
15693137d4e2786b2117bd35ce6051968bd06b5b5bcd64e947ef6eace0834b82.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Targets
-
-
Target
15693137d4e2786b2117bd35ce6051968bd06b5b5bcd64e947ef6eace0834b82
-
Size
540KB
-
MD5
0c20cf414b1223fad681a0b21e3c6e47
-
SHA1
62f785406ac96ffb81e0446e2d01df31457c971f
-
SHA256
15693137d4e2786b2117bd35ce6051968bd06b5b5bcd64e947ef6eace0834b82
-
SHA512
9251def385b6fc07aacbdea01024d766170f9c4dfdb0dd7be2da198fb4ab934145cca6cc25f8f7c2dbf120803cda613221e90c957a5e8bf5240b1e0a5ff623d8
-
SSDEEP
12288:KMrky90JSIeET4xQy/qwI52aOj7GZ0uj3TK7fOWr0X:iywSZ1qJ57Oj7GO57f8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-