General
-
Target
9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886
-
Size
539KB
-
Sample
230324-hdt3vscf87
-
MD5
3223ab5f99c0f20737cc89b7371f7cbe
-
SHA1
e2586bfdf13d2f056182486ea62a2768ee9757cd
-
SHA256
9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886
-
SHA512
e1e05dd18ab6280122a5d94e4d0823479a1aa293e8b5d105e881161e1ae31aae57840ce4a073b8af03a3ed8c8c070fcb3730e3a2ccdc4a1704767ba5827a65df
-
SSDEEP
12288:YMrny90PuAngYW+gv5+Y0E6E28LM5Q//i1JGx0wqgh6V:fy4nBW7v5n019Q/6G2Tg6
Static task
static1
Behavioral task
behavioral1
Sample
9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Targets
-
-
Target
9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886
-
Size
539KB
-
MD5
3223ab5f99c0f20737cc89b7371f7cbe
-
SHA1
e2586bfdf13d2f056182486ea62a2768ee9757cd
-
SHA256
9777dc6f2e370f6b97fe7573145f1f1c4891eecdea2b1c019b940c12e7c78886
-
SHA512
e1e05dd18ab6280122a5d94e4d0823479a1aa293e8b5d105e881161e1ae31aae57840ce4a073b8af03a3ed8c8c070fcb3730e3a2ccdc4a1704767ba5827a65df
-
SSDEEP
12288:YMrny90PuAngYW+gv5+Y0E6E28LM5Q//i1JGx0wqgh6V:fy4nBW7v5n019Q/6G2Tg6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-