General
-
Target
35fffcdf09cba486bc03762b0e17d25484fcefdcf457ce3f5a6ec1dd8fef9060
-
Size
546KB
-
Sample
230323-3f27gach2z
-
MD5
7d91f1d2488886f9a38543e480db9c82
-
SHA1
caf8a7e70f9be53cb484662d1889a495482900c5
-
SHA256
35fffcdf09cba486bc03762b0e17d25484fcefdcf457ce3f5a6ec1dd8fef9060
-
SHA512
666e27b72ea5a429eb8406e2d0c917bd0f7b70a5fce89b94bc0cd7a7ea031ab066c19a40687dd60694c7b61f63a923d8220f930697a5b5fc97d20dbc75bdcc0d
-
SSDEEP
12288:OMrSy90oG9whNDsyrVw5cERvnDfpTCMrUYfb:IyRAChsB5VRGcjfb
Static task
static1
Behavioral task
behavioral1
Sample
35fffcdf09cba486bc03762b0e17d25484fcefdcf457ce3f5a6ec1dd8fef9060.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
35fffcdf09cba486bc03762b0e17d25484fcefdcf457ce3f5a6ec1dd8fef9060
-
Size
546KB
-
MD5
7d91f1d2488886f9a38543e480db9c82
-
SHA1
caf8a7e70f9be53cb484662d1889a495482900c5
-
SHA256
35fffcdf09cba486bc03762b0e17d25484fcefdcf457ce3f5a6ec1dd8fef9060
-
SHA512
666e27b72ea5a429eb8406e2d0c917bd0f7b70a5fce89b94bc0cd7a7ea031ab066c19a40687dd60694c7b61f63a923d8220f930697a5b5fc97d20dbc75bdcc0d
-
SSDEEP
12288:OMrSy90oG9whNDsyrVw5cERvnDfpTCMrUYfb:IyRAChsB5VRGcjfb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-