General
-
Target
10b52a7f231da59e6f21f6626747c17a3e49f5592d0c4ff317ff344b89f9e029
-
Size
540KB
-
Sample
230323-ax8rcsec9s
-
MD5
f40e5517e8432c52416407a40a7d8eb4
-
SHA1
94a4f915c4d5f529bc944bbbf7689becf047d823
-
SHA256
10b52a7f231da59e6f21f6626747c17a3e49f5592d0c4ff317ff344b89f9e029
-
SHA512
e667a09ea8642e0e9f00c5ab463d21cefdd4667286d5fcaf5bc46ddd6d340005fd4c28e8e23d5475ab7cf204dc82bd4117dc324ad67971a57f5f8d4dc0537e10
-
SSDEEP
12288:fMrKy90lkoXHruqLT1dxUACUARzAd0GtlzdyQo6wmjyV:Ryukuqq9dxYUAyd0Gt9Jo65jyV
Static task
static1
Behavioral task
behavioral1
Sample
10b52a7f231da59e6f21f6626747c17a3e49f5592d0c4ff317ff344b89f9e029.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
10b52a7f231da59e6f21f6626747c17a3e49f5592d0c4ff317ff344b89f9e029
-
Size
540KB
-
MD5
f40e5517e8432c52416407a40a7d8eb4
-
SHA1
94a4f915c4d5f529bc944bbbf7689becf047d823
-
SHA256
10b52a7f231da59e6f21f6626747c17a3e49f5592d0c4ff317ff344b89f9e029
-
SHA512
e667a09ea8642e0e9f00c5ab463d21cefdd4667286d5fcaf5bc46ddd6d340005fd4c28e8e23d5475ab7cf204dc82bd4117dc324ad67971a57f5f8d4dc0537e10
-
SSDEEP
12288:fMrKy90lkoXHruqLT1dxUACUARzAd0GtlzdyQo6wmjyV:Ryukuqq9dxYUAyd0Gt9Jo65jyV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-