General
-
Target
cbd137063c101eb620c4cac83c346b013d16f48b603155231866b9729c348667
-
Size
682KB
-
Sample
230323-cqaxvsda45
-
MD5
ed07df2b64e8ab99c598c3fd8d092454
-
SHA1
346ba353a90c983e2a7b59ae77321496755dd7c6
-
SHA256
cbd137063c101eb620c4cac83c346b013d16f48b603155231866b9729c348667
-
SHA512
ba9b0527a100378305ca37f0e6582fe80ee7901e414ca6c9f2165f59f42c57f8c57eb51ef47591c8eb7dca777c928d472c6cb60dab1135d7162a82e09868dd56
-
SSDEEP
12288:E/2+N/Arrf2R06BkiV0xyUT6AxqkOivzDLPkh6FwbyK8icKiRGy:EdAfXiCxy66AxqiDWtbyKdFy
Static task
static1
Behavioral task
behavioral1
Sample
cbd137063c101eb620c4cac83c346b013d16f48b603155231866b9729c348667.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
cbd137063c101eb620c4cac83c346b013d16f48b603155231866b9729c348667
-
Size
682KB
-
MD5
ed07df2b64e8ab99c598c3fd8d092454
-
SHA1
346ba353a90c983e2a7b59ae77321496755dd7c6
-
SHA256
cbd137063c101eb620c4cac83c346b013d16f48b603155231866b9729c348667
-
SHA512
ba9b0527a100378305ca37f0e6582fe80ee7901e414ca6c9f2165f59f42c57f8c57eb51ef47591c8eb7dca777c928d472c6cb60dab1135d7162a82e09868dd56
-
SSDEEP
12288:E/2+N/Arrf2R06BkiV0xyUT6AxqkOivzDLPkh6FwbyK8icKiRGy:EdAfXiCxy66AxqiDWtbyKdFy
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-