General
-
Target
57ed9275a663712413df6f55ed38d5792eb0c1672a005b3fb4ebdc19764b784a
-
Size
544KB
-
Sample
230323-1g3hhscc6z
-
MD5
d2dbc9bfd2ea4986b0d7acb81aafe78b
-
SHA1
f8bf98ae739127ee942a937f189ab35e0877ad0a
-
SHA256
57ed9275a663712413df6f55ed38d5792eb0c1672a005b3fb4ebdc19764b784a
-
SHA512
70a369598ce47b3fb04a5aa0744df63ae1a1f0e867f7d498496d8cc8424f55bb5163a21f87c511295f7f69fdef08411c618244e77c9ea884ec15f3cf4aa2ed7a
-
SSDEEP
12288:ZMrWy90uyXtoJdaLAD32drh1u2spLtBqgU5MLvwje8+9PlGE8Ais9IHj:jyYGWcujuVpL9oMzF9PgE1iR
Static task
static1
Behavioral task
behavioral1
Sample
57ed9275a663712413df6f55ed38d5792eb0c1672a005b3fb4ebdc19764b784a.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
57ed9275a663712413df6f55ed38d5792eb0c1672a005b3fb4ebdc19764b784a
-
Size
544KB
-
MD5
d2dbc9bfd2ea4986b0d7acb81aafe78b
-
SHA1
f8bf98ae739127ee942a937f189ab35e0877ad0a
-
SHA256
57ed9275a663712413df6f55ed38d5792eb0c1672a005b3fb4ebdc19764b784a
-
SHA512
70a369598ce47b3fb04a5aa0744df63ae1a1f0e867f7d498496d8cc8424f55bb5163a21f87c511295f7f69fdef08411c618244e77c9ea884ec15f3cf4aa2ed7a
-
SSDEEP
12288:ZMrWy90uyXtoJdaLAD32drh1u2spLtBqgU5MLvwje8+9PlGE8Ais9IHj:jyYGWcujuVpL9oMzF9PgE1iR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-