General
-
Target
a679f9eeaa538db88a36a8bcb35276809c6f99d65cd43002abe518f4fd1ad58e
-
Size
681KB
-
Sample
230323-laxw5agf6y
-
MD5
8530eaad21dc4375cace691728ba6338
-
SHA1
33f6efddf182457d1ee9d07402887fd166246296
-
SHA256
a679f9eeaa538db88a36a8bcb35276809c6f99d65cd43002abe518f4fd1ad58e
-
SHA512
296165329eb45645e922f436f0f23636050b905b45aa3d731acd06b49ef5f5caad48b59b0168d084be12b2abced257ec705917c5491c4ba586c8ecc55c4c8e73
-
SSDEEP
12288:R2ojBKZrg5SmePIA7/ELeej4rWLryxMsnlKAmPctv79HhcklY4XaUPpxc:YK+c5SmLRjFLrZsnob0N79HhPXDPpS
Static task
static1
Behavioral task
behavioral1
Sample
a679f9eeaa538db88a36a8bcb35276809c6f99d65cd43002abe518f4fd1ad58e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
a679f9eeaa538db88a36a8bcb35276809c6f99d65cd43002abe518f4fd1ad58e
-
Size
681KB
-
MD5
8530eaad21dc4375cace691728ba6338
-
SHA1
33f6efddf182457d1ee9d07402887fd166246296
-
SHA256
a679f9eeaa538db88a36a8bcb35276809c6f99d65cd43002abe518f4fd1ad58e
-
SHA512
296165329eb45645e922f436f0f23636050b905b45aa3d731acd06b49ef5f5caad48b59b0168d084be12b2abced257ec705917c5491c4ba586c8ecc55c4c8e73
-
SSDEEP
12288:R2ojBKZrg5SmePIA7/ELeej4rWLryxMsnlKAmPctv79HhcklY4XaUPpxc:YK+c5SmLRjFLrZsnob0N79HhPXDPpS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-