General
-
Target
7f5ddc135b78d790b5fe7434cde7dd50f8ded523277eb4248307c5dc6e5cbd53
-
Size
681KB
-
Sample
230323-pb63zahd6z
-
MD5
cc8eca225d1453c161012fda7be16a44
-
SHA1
bda9bf26f3ba057472761efcd1f1115cf3e1cabe
-
SHA256
7f5ddc135b78d790b5fe7434cde7dd50f8ded523277eb4248307c5dc6e5cbd53
-
SHA512
d127be3edc7e234b3ac09bd13c4b8b5f5f38a15951d8d5bad9f522fe49d2fe60d4baa427ad1f97122087b7270c93d19011059bc08c72093b3676574df9430613
-
SSDEEP
12288:12ojXbiawPnPM5xFOEiwdj6jDji7KKIlShP22nNr9:cUOaiELUEb2jCePQPR
Static task
static1
Behavioral task
behavioral1
Sample
7f5ddc135b78d790b5fe7434cde7dd50f8ded523277eb4248307c5dc6e5cbd53.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
7f5ddc135b78d790b5fe7434cde7dd50f8ded523277eb4248307c5dc6e5cbd53
-
Size
681KB
-
MD5
cc8eca225d1453c161012fda7be16a44
-
SHA1
bda9bf26f3ba057472761efcd1f1115cf3e1cabe
-
SHA256
7f5ddc135b78d790b5fe7434cde7dd50f8ded523277eb4248307c5dc6e5cbd53
-
SHA512
d127be3edc7e234b3ac09bd13c4b8b5f5f38a15951d8d5bad9f522fe49d2fe60d4baa427ad1f97122087b7270c93d19011059bc08c72093b3676574df9430613
-
SSDEEP
12288:12ojXbiawPnPM5xFOEiwdj6jDji7KKIlShP22nNr9:cUOaiELUEb2jCePQPR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-