General
-
Target
65db45c51e2ccc802693ff6a3b9071182c808eab597cbdc41d83e57dfe5f0b37
-
Size
544KB
-
Sample
230323-znx1yaab24
-
MD5
2db7494335733570623dbf06b7c74671
-
SHA1
f167157f9046430c8ad7ab4f50c9ae98dc6d8d02
-
SHA256
65db45c51e2ccc802693ff6a3b9071182c808eab597cbdc41d83e57dfe5f0b37
-
SHA512
d381bbc93ee190aff360d80b3a52e6095e9ba3e8af6967e021cdd524bcb29f9a3f37c20862cfe0ab09bded7562302e919cba2c6d6e432ff12d670685cbb57637
-
SSDEEP
12288:bMriy90qj53QBAgGBcTKqgUyMLZwCQABWIzXMTPtkV:tyf3QBiTMV/VXM7c
Static task
static1
Behavioral task
behavioral1
Sample
65db45c51e2ccc802693ff6a3b9071182c808eab597cbdc41d83e57dfe5f0b37.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
real
193.233.20.31:4125
-
auth_value
bb22a50228754849387d5f4d1611e71b
Targets
-
-
Target
65db45c51e2ccc802693ff6a3b9071182c808eab597cbdc41d83e57dfe5f0b37
-
Size
544KB
-
MD5
2db7494335733570623dbf06b7c74671
-
SHA1
f167157f9046430c8ad7ab4f50c9ae98dc6d8d02
-
SHA256
65db45c51e2ccc802693ff6a3b9071182c808eab597cbdc41d83e57dfe5f0b37
-
SHA512
d381bbc93ee190aff360d80b3a52e6095e9ba3e8af6967e021cdd524bcb29f9a3f37c20862cfe0ab09bded7562302e919cba2c6d6e432ff12d670685cbb57637
-
SSDEEP
12288:bMriy90qj53QBAgGBcTKqgUyMLZwCQABWIzXMTPtkV:tyf3QBiTMV/VXM7c
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-