General
-
Target
6202dcc9a68ef95bba6c14bd091c5a7683e56651cfa71e9b640685af4153cd1a
-
Size
690KB
-
Sample
230323-3x43dsah77
-
MD5
962ab43af49bffb4d4084c60665f9b7f
-
SHA1
cb331a445e48c4f364288642811d12f3dcecf71b
-
SHA256
6202dcc9a68ef95bba6c14bd091c5a7683e56651cfa71e9b640685af4153cd1a
-
SHA512
92a1eb113171d5f2b492d2372a8313e1585d22119efa276a972e16c416915622037f3dae52d0da0bf61554426f83ae53fd3aa1ba935d198c5415283ba86413af
-
SSDEEP
12288:KMA1XlYcsasrYwYVQ7UsioJ8ijdV/EPUsWqunPfEzWfdkfvR1d/tXmwH:KM03s6w5UsPjD//sWqofEifG75tXvH
Static task
static1
Behavioral task
behavioral1
Sample
6202dcc9a68ef95bba6c14bd091c5a7683e56651cfa71e9b640685af4153cd1a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
6202dcc9a68ef95bba6c14bd091c5a7683e56651cfa71e9b640685af4153cd1a
-
Size
690KB
-
MD5
962ab43af49bffb4d4084c60665f9b7f
-
SHA1
cb331a445e48c4f364288642811d12f3dcecf71b
-
SHA256
6202dcc9a68ef95bba6c14bd091c5a7683e56651cfa71e9b640685af4153cd1a
-
SHA512
92a1eb113171d5f2b492d2372a8313e1585d22119efa276a972e16c416915622037f3dae52d0da0bf61554426f83ae53fd3aa1ba935d198c5415283ba86413af
-
SSDEEP
12288:KMA1XlYcsasrYwYVQ7UsioJ8ijdV/EPUsWqunPfEzWfdkfvR1d/tXmwH:KM03s6w5UsPjD//sWqofEifG75tXvH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-