General
-
Target
e972b835ade4bbe6e06e8d3560b3b867ed6dac790b74ed2b168cb27bb2b78151
-
Size
550KB
-
Sample
230322-zwkqksdc8s
-
MD5
ba982e56413af11917f6f7059116b564
-
SHA1
1dcd98c1d486b48b9988a213dd69ffec465e4a8e
-
SHA256
e972b835ade4bbe6e06e8d3560b3b867ed6dac790b74ed2b168cb27bb2b78151
-
SHA512
24cabba43bbe9a5f78ca6d94251995cbdaaae6ac9420e0ba798a20b8cfdd97449a4ea883a68119adcf2c7d71c6a931df6d4b2a7f9bf0104bf297a7a64e647905
-
SSDEEP
12288:iMrmy907KMwETnYXum0nQoG7zXeEmc/d7JfHrsIe6X:Iy+KpBXIQh7zXxmc/dm0
Static task
static1
Behavioral task
behavioral1
Sample
e972b835ade4bbe6e06e8d3560b3b867ed6dac790b74ed2b168cb27bb2b78151.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Targets
-
-
Target
e972b835ade4bbe6e06e8d3560b3b867ed6dac790b74ed2b168cb27bb2b78151
-
Size
550KB
-
MD5
ba982e56413af11917f6f7059116b564
-
SHA1
1dcd98c1d486b48b9988a213dd69ffec465e4a8e
-
SHA256
e972b835ade4bbe6e06e8d3560b3b867ed6dac790b74ed2b168cb27bb2b78151
-
SHA512
24cabba43bbe9a5f78ca6d94251995cbdaaae6ac9420e0ba798a20b8cfdd97449a4ea883a68119adcf2c7d71c6a931df6d4b2a7f9bf0104bf297a7a64e647905
-
SSDEEP
12288:iMrmy907KMwETnYXum0nQoG7zXeEmc/d7JfHrsIe6X:Iy+KpBXIQh7zXxmc/dm0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-