General
-
Target
6605237f4c146f50dc593221d742e53208a8e41a3d818e4259b8121fadeb117c
-
Size
546KB
-
Sample
230323-3qm6asah42
-
MD5
02aad056263f72f990b2c6cbabd98641
-
SHA1
9708f27e7af991bf8030aa3f0b456db08b45af20
-
SHA256
6605237f4c146f50dc593221d742e53208a8e41a3d818e4259b8121fadeb117c
-
SHA512
18f400ed69ec0fa6565cf63c412616f84226c145e4977f603ef50bca39014dc15d9d13a7f70b02177fa89720ae265925182eb8a6698be95e9fe1ca4a9b107a17
-
SSDEEP
12288:IMr8y901Kh5lOtaexx+Z1k6e+zWro4Tl6RCzpax+wgMZ5:Ey845kPqzPe+z6AQ1agMZ5
Static task
static1
Behavioral task
behavioral1
Sample
6605237f4c146f50dc593221d742e53208a8e41a3d818e4259b8121fadeb117c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
6605237f4c146f50dc593221d742e53208a8e41a3d818e4259b8121fadeb117c
-
Size
546KB
-
MD5
02aad056263f72f990b2c6cbabd98641
-
SHA1
9708f27e7af991bf8030aa3f0b456db08b45af20
-
SHA256
6605237f4c146f50dc593221d742e53208a8e41a3d818e4259b8121fadeb117c
-
SHA512
18f400ed69ec0fa6565cf63c412616f84226c145e4977f603ef50bca39014dc15d9d13a7f70b02177fa89720ae265925182eb8a6698be95e9fe1ca4a9b107a17
-
SSDEEP
12288:IMr8y901Kh5lOtaexx+Z1k6e+zWro4Tl6RCzpax+wgMZ5:Ey845kPqzPe+z6AQ1agMZ5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-