General
-
Target
f80ad6700438634a045ac12702f0262b9b0f676d6541d5cb8e79b978a2a7543e
-
Size
544KB
-
Sample
230323-z966qscc3w
-
MD5
68c8761a4a64563dbef6151e0682dd83
-
SHA1
fe1f39f03aaf4a27e16af141dc1e338a43311377
-
SHA256
f80ad6700438634a045ac12702f0262b9b0f676d6541d5cb8e79b978a2a7543e
-
SHA512
bfc5bcabb5b0ea7f3d4b81e40204cd643daf7cd7e9b541581d6b59ce7555971b992e3e3be7fa06d28bbbecadf3ee8e45b29fd4d4bb7db81d56cc1f23521a34d0
-
SSDEEP
12288:TMroy90bquDiZskT0+bcL7zxYwqgUBML7wiPxg8JlP:3ygfsk+ILe88MHnPy+P
Static task
static1
Behavioral task
behavioral1
Sample
f80ad6700438634a045ac12702f0262b9b0f676d6541d5cb8e79b978a2a7543e.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
f80ad6700438634a045ac12702f0262b9b0f676d6541d5cb8e79b978a2a7543e
-
Size
544KB
-
MD5
68c8761a4a64563dbef6151e0682dd83
-
SHA1
fe1f39f03aaf4a27e16af141dc1e338a43311377
-
SHA256
f80ad6700438634a045ac12702f0262b9b0f676d6541d5cb8e79b978a2a7543e
-
SHA512
bfc5bcabb5b0ea7f3d4b81e40204cd643daf7cd7e9b541581d6b59ce7555971b992e3e3be7fa06d28bbbecadf3ee8e45b29fd4d4bb7db81d56cc1f23521a34d0
-
SSDEEP
12288:TMroy90bquDiZskT0+bcL7zxYwqgUBML7wiPxg8JlP:3ygfsk+ILe88MHnPy+P
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-