General
-
Target
b1e850e30a528ecabd41dbf08d7a8d8e38af48374ef448e46eed4b0eb70b936a
-
Size
679KB
-
Sample
230323-z4rh4acb8v
-
MD5
8a2f3fe72bcac8e607b934afb00b5b70
-
SHA1
cae20739164bbe1aec203285336db2eff879d499
-
SHA256
b1e850e30a528ecabd41dbf08d7a8d8e38af48374ef448e46eed4b0eb70b936a
-
SHA512
9312c0721cc13a12b233c16e1d5b3521de55f8e3ea6a49a0136235191d9777ef5454b664f3885e70e44d73b72f5483d80abba237d3851f3dbf1c86c45b5340fb
-
SSDEEP
12288:WGHIGD4gZKt4U5Mu3iTTKJ2e32cc8M1o/SldCnGoxkqeYBndoehW8ArY+v4:J/HeDoTKwC2r8mldwGWkCoevSY+A
Static task
static1
Behavioral task
behavioral1
Sample
b1e850e30a528ecabd41dbf08d7a8d8e38af48374ef448e46eed4b0eb70b936a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
b1e850e30a528ecabd41dbf08d7a8d8e38af48374ef448e46eed4b0eb70b936a
-
Size
679KB
-
MD5
8a2f3fe72bcac8e607b934afb00b5b70
-
SHA1
cae20739164bbe1aec203285336db2eff879d499
-
SHA256
b1e850e30a528ecabd41dbf08d7a8d8e38af48374ef448e46eed4b0eb70b936a
-
SHA512
9312c0721cc13a12b233c16e1d5b3521de55f8e3ea6a49a0136235191d9777ef5454b664f3885e70e44d73b72f5483d80abba237d3851f3dbf1c86c45b5340fb
-
SSDEEP
12288:WGHIGD4gZKt4U5Mu3iTTKJ2e32cc8M1o/SldCnGoxkqeYBndoehW8ArY+v4:J/HeDoTKwC2r8mldwGWkCoevSY+A
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-