General
-
Target
cf55420cb4b2035ba5903c9f25377c732ad17a6c19dcf7384baa4f108fd15e3b
-
Size
544KB
-
Sample
230323-2kagksaf24
-
MD5
74c58daee59afab7a32c09cccae41a61
-
SHA1
fda222612fbdeb313f27d365f61395b5a703688b
-
SHA256
cf55420cb4b2035ba5903c9f25377c732ad17a6c19dcf7384baa4f108fd15e3b
-
SHA512
e351d21a68b76e98cb1c1e27e1c7da748c6c985006c5ea25ec1cb9ea9b9a48a2c1b527b098912d966c7e3dffee70f363aad53e2d119a08e5f741d63326351a67
-
SSDEEP
12288:0Mrwy90KmDJ/B7Ii21sQCy8FvRRbyqgULMLGwQth+XPlfM50xNG6SP:0yADlBc11PcvRRbWmMSneXPLGLP
Static task
static1
Behavioral task
behavioral1
Sample
cf55420cb4b2035ba5903c9f25377c732ad17a6c19dcf7384baa4f108fd15e3b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
cf55420cb4b2035ba5903c9f25377c732ad17a6c19dcf7384baa4f108fd15e3b
-
Size
544KB
-
MD5
74c58daee59afab7a32c09cccae41a61
-
SHA1
fda222612fbdeb313f27d365f61395b5a703688b
-
SHA256
cf55420cb4b2035ba5903c9f25377c732ad17a6c19dcf7384baa4f108fd15e3b
-
SHA512
e351d21a68b76e98cb1c1e27e1c7da748c6c985006c5ea25ec1cb9ea9b9a48a2c1b527b098912d966c7e3dffee70f363aad53e2d119a08e5f741d63326351a67
-
SSDEEP
12288:0Mrwy90KmDJ/B7Ii21sQCy8FvRRbyqgULMLGwQth+XPlfM50xNG6SP:0yADlBc11PcvRRbWmMSneXPLGLP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-