General
-
Target
b9a7911757771d52236a5ed1f7732019809128427659dea53f90741aa4869b34
-
Size
679KB
-
Sample
230323-1zdbcaad88
-
MD5
8790ae955bba241a5ba8670ff5339f90
-
SHA1
0c58e71b5c7afa2867566808102a32984650dd53
-
SHA256
b9a7911757771d52236a5ed1f7732019809128427659dea53f90741aa4869b34
-
SHA512
b35a505e5ec91453596687bae84568f5c7cbf87df8a3877f1e452132721ebf9ce2b62867de3780e857f0ce66699b610567f04bf1ceaf00a1aaebbf3ff303474b
-
SSDEEP
12288:TGHIGD4gZKt4U5Mu3iTTKJ2e32cc8M1o/SldCnGoxkqeYBndoehW8ArY+v4:2/HeDoTKwC2r8mldwGWkCoevSY+A
Static task
static1
Behavioral task
behavioral1
Sample
b9a7911757771d52236a5ed1f7732019809128427659dea53f90741aa4869b34.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
b9a7911757771d52236a5ed1f7732019809128427659dea53f90741aa4869b34
-
Size
679KB
-
MD5
8790ae955bba241a5ba8670ff5339f90
-
SHA1
0c58e71b5c7afa2867566808102a32984650dd53
-
SHA256
b9a7911757771d52236a5ed1f7732019809128427659dea53f90741aa4869b34
-
SHA512
b35a505e5ec91453596687bae84568f5c7cbf87df8a3877f1e452132721ebf9ce2b62867de3780e857f0ce66699b610567f04bf1ceaf00a1aaebbf3ff303474b
-
SSDEEP
12288:TGHIGD4gZKt4U5Mu3iTTKJ2e32cc8M1o/SldCnGoxkqeYBndoehW8ArY+v4:2/HeDoTKwC2r8mldwGWkCoevSY+A
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-