General
-
Target
ca0f50f9705dd2af6ba109882535a00361394f6e29d9b8e4c84d59298b15f60d
-
Size
556KB
-
Sample
230324-2fm7wahg55
-
MD5
8ecde932aebcfdfd4a09f343893d3eac
-
SHA1
56c429f6d5138f54623772977088394de294d309
-
SHA256
ca0f50f9705dd2af6ba109882535a00361394f6e29d9b8e4c84d59298b15f60d
-
SHA512
91bf22b2b82597ef28dbb270f362fae7bee6e99d0983d198206784f2b68339fbab838b53878346b765887b99b3d4c0912e783be90306b84e4ffd82286ecb4860
-
SSDEEP
12288:UMrNy90M/VTKyLWdY1LEI9CYfMN7gGp450tR7K:pyL/BpLWe1gh79vRe
Static task
static1
Behavioral task
behavioral1
Sample
ca0f50f9705dd2af6ba109882535a00361394f6e29d9b8e4c84d59298b15f60d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lenka
193.233.20.32:4125
-
auth_value
8a60e8b2ec79d6a7e92f9feac39b8830
Targets
-
-
Target
ca0f50f9705dd2af6ba109882535a00361394f6e29d9b8e4c84d59298b15f60d
-
Size
556KB
-
MD5
8ecde932aebcfdfd4a09f343893d3eac
-
SHA1
56c429f6d5138f54623772977088394de294d309
-
SHA256
ca0f50f9705dd2af6ba109882535a00361394f6e29d9b8e4c84d59298b15f60d
-
SHA512
91bf22b2b82597ef28dbb270f362fae7bee6e99d0983d198206784f2b68339fbab838b53878346b765887b99b3d4c0912e783be90306b84e4ffd82286ecb4860
-
SSDEEP
12288:UMrNy90M/VTKyLWdY1LEI9CYfMN7gGp450tR7K:pyL/BpLWe1gh79vRe
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-