General
-
Target
a94f2cc0c73369631e07d03699113779502b09ba11f5321acf5f4651856b9ee7
-
Size
544KB
-
Sample
230323-1dmb5aac64
-
MD5
6f63c20560049a2e1deef16cc0c7a688
-
SHA1
a50f34ba7f26bf7339a190378c650a52f966de5e
-
SHA256
a94f2cc0c73369631e07d03699113779502b09ba11f5321acf5f4651856b9ee7
-
SHA512
91b2f01caaaecf2eedb2f012db2a7ae5291e3ead380cc239187a6bf8992db4734e635322fbeb6301ee53900107523ed048b382a9b7809e433223264b176a73f8
-
SSDEEP
12288:+MrUy90QryuqBU2vooN4SNPCGfc0OdvZqgUNMLSwEdeBgvC22cYm:2ybry5a6ooN4SCpsMm8gvCBc
Static task
static1
Behavioral task
behavioral1
Sample
a94f2cc0c73369631e07d03699113779502b09ba11f5321acf5f4651856b9ee7.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
a94f2cc0c73369631e07d03699113779502b09ba11f5321acf5f4651856b9ee7
-
Size
544KB
-
MD5
6f63c20560049a2e1deef16cc0c7a688
-
SHA1
a50f34ba7f26bf7339a190378c650a52f966de5e
-
SHA256
a94f2cc0c73369631e07d03699113779502b09ba11f5321acf5f4651856b9ee7
-
SHA512
91b2f01caaaecf2eedb2f012db2a7ae5291e3ead380cc239187a6bf8992db4734e635322fbeb6301ee53900107523ed048b382a9b7809e433223264b176a73f8
-
SSDEEP
12288:+MrUy90QryuqBU2vooN4SNPCGfc0OdvZqgUNMLSwEdeBgvC22cYm:2ybry5a6ooN4SCpsMm8gvCBc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-