General
-
Target
b119fe84b68642d55c695a7ea897193de15882d99927309b5d8a4d89c8de8a4f
-
Size
539KB
-
Sample
230324-h7qmjafa3z
-
MD5
863cab4c5dd6e8ff99e719ef1a59ae19
-
SHA1
4f0afa43e82c95b9de7bf490e6199e626f8ed36e
-
SHA256
b119fe84b68642d55c695a7ea897193de15882d99927309b5d8a4d89c8de8a4f
-
SHA512
8c253bea7cacedc65bc97d60532881ef37f0a4307455e37bc7b772bc1968acaadd329d0dbe298c53e0b969747c5cbde97c4e04d18d435e9ce83b096b39cc3263
-
SSDEEP
12288:cMrky906nndlx6rJSIhDPTYN+MjpWxLN9iGb90gfVK:4y1vErJ1hDGpWxLHiM97c
Static task
static1
Behavioral task
behavioral1
Sample
b119fe84b68642d55c695a7ea897193de15882d99927309b5d8a4d89c8de8a4f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
b119fe84b68642d55c695a7ea897193de15882d99927309b5d8a4d89c8de8a4f
-
Size
539KB
-
MD5
863cab4c5dd6e8ff99e719ef1a59ae19
-
SHA1
4f0afa43e82c95b9de7bf490e6199e626f8ed36e
-
SHA256
b119fe84b68642d55c695a7ea897193de15882d99927309b5d8a4d89c8de8a4f
-
SHA512
8c253bea7cacedc65bc97d60532881ef37f0a4307455e37bc7b772bc1968acaadd329d0dbe298c53e0b969747c5cbde97c4e04d18d435e9ce83b096b39cc3263
-
SSDEEP
12288:cMrky906nndlx6rJSIhDPTYN+MjpWxLN9iGb90gfVK:4y1vErJ1hDGpWxLHiM97c
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-