General
-
Target
1646eaa2259cad7a0a86ed384df8e6ea9294c91d23b102b2f7f604930c8735a5
-
Size
691KB
-
Sample
230324-3rvxjaaa76
-
MD5
4392bb91c1b2d06db7939e9b2b69f5c5
-
SHA1
4abb9afeaaa1e08ed75f6348f8039a9e5c7ec3fe
-
SHA256
1646eaa2259cad7a0a86ed384df8e6ea9294c91d23b102b2f7f604930c8735a5
-
SHA512
2ad1c7b31703b7c914492a3b21717f9f7739ff931efedb4ee134a2ed18084ba23ba0caa0d7c5bcbd20ced68df2d9f80d55097703236bb9c9cc7e88f48ca8ba56
-
SSDEEP
12288:FMruy90LSmrf2S4Jf/oZgCuaI09RwDvTgldQb6VbUu:byKDx4i2Cua59RuTAou
Static task
static1
Behavioral task
behavioral1
Sample
1646eaa2259cad7a0a86ed384df8e6ea9294c91d23b102b2f7f604930c8735a5.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lenka
193.233.20.32:4125
-
auth_value
8a60e8b2ec79d6a7e92f9feac39b8830
Targets
-
-
Target
1646eaa2259cad7a0a86ed384df8e6ea9294c91d23b102b2f7f604930c8735a5
-
Size
691KB
-
MD5
4392bb91c1b2d06db7939e9b2b69f5c5
-
SHA1
4abb9afeaaa1e08ed75f6348f8039a9e5c7ec3fe
-
SHA256
1646eaa2259cad7a0a86ed384df8e6ea9294c91d23b102b2f7f604930c8735a5
-
SHA512
2ad1c7b31703b7c914492a3b21717f9f7739ff931efedb4ee134a2ed18084ba23ba0caa0d7c5bcbd20ced68df2d9f80d55097703236bb9c9cc7e88f48ca8ba56
-
SSDEEP
12288:FMruy90LSmrf2S4Jf/oZgCuaI09RwDvTgldQb6VbUu:byKDx4i2Cua59RuTAou
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-