General
-
Target
e9e661a89abbc24d84ea1a61ca755d6f19d49862872acb123c3df68c82860a65
-
Size
540KB
-
Sample
230323-cej2dsch48
-
MD5
b9aa74641dbe0b995e0bacd742625047
-
SHA1
6523b5846d964f855018f4bfe8d7af897471a744
-
SHA256
e9e661a89abbc24d84ea1a61ca755d6f19d49862872acb123c3df68c82860a65
-
SHA512
327c65c52dc032de349ece9a3a73aa75532cc41f005aeb8546ac72ef7f3814b1a998a0adcbed2e40082376eaad20285f2cd345530f540557ea898df56c7aea54
-
SSDEEP
12288:JMrmy906VPyX/EvA/OZ2afKEwvtp0c1E6ZgFgUOkbKhDaAw3N:Pyw/V8LE4WOKHeN
Static task
static1
Behavioral task
behavioral1
Sample
e9e661a89abbc24d84ea1a61ca755d6f19d49862872acb123c3df68c82860a65.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
lown
193.233.20.31:4125
-
auth_value
4cf836e062bcdc2a4fdbf410f5747ec7
Targets
-
-
Target
e9e661a89abbc24d84ea1a61ca755d6f19d49862872acb123c3df68c82860a65
-
Size
540KB
-
MD5
b9aa74641dbe0b995e0bacd742625047
-
SHA1
6523b5846d964f855018f4bfe8d7af897471a744
-
SHA256
e9e661a89abbc24d84ea1a61ca755d6f19d49862872acb123c3df68c82860a65
-
SHA512
327c65c52dc032de349ece9a3a73aa75532cc41f005aeb8546ac72ef7f3814b1a998a0adcbed2e40082376eaad20285f2cd345530f540557ea898df56c7aea54
-
SSDEEP
12288:JMrmy906VPyX/EvA/OZ2afKEwvtp0c1E6ZgFgUOkbKhDaAw3N:Pyw/V8LE4WOKHeN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-