General
-
Target
e49e02d29df40e71c68304c1ea4e224712487af6fbbad1f8cd0489d0e3c3ba65
-
Size
540KB
-
Sample
230324-htj8lacg82
-
MD5
40eda221fb3f4de27cda41be79a8a332
-
SHA1
350ee5873f2e5bb6fa3c6639cc0096b3bb8414ba
-
SHA256
e49e02d29df40e71c68304c1ea4e224712487af6fbbad1f8cd0489d0e3c3ba65
-
SHA512
313f07e708689f6091f51996190455a4baad8d60e2159efab9b28431e34d939bc17f27dc064b8bbff2f8eabe81328a3f58609ba68fb052b87f45d6201e7b899f
-
SSDEEP
12288:jMrKy90UDDp4sxlcjERNTKGL5uueXG77WMcxqK4cont0:VyPDDp4sxqyxzhemuxqlt0
Static task
static1
Behavioral task
behavioral1
Sample
e49e02d29df40e71c68304c1ea4e224712487af6fbbad1f8cd0489d0e3c3ba65.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
e49e02d29df40e71c68304c1ea4e224712487af6fbbad1f8cd0489d0e3c3ba65
-
Size
540KB
-
MD5
40eda221fb3f4de27cda41be79a8a332
-
SHA1
350ee5873f2e5bb6fa3c6639cc0096b3bb8414ba
-
SHA256
e49e02d29df40e71c68304c1ea4e224712487af6fbbad1f8cd0489d0e3c3ba65
-
SHA512
313f07e708689f6091f51996190455a4baad8d60e2159efab9b28431e34d939bc17f27dc064b8bbff2f8eabe81328a3f58609ba68fb052b87f45d6201e7b899f
-
SSDEEP
12288:jMrKy90UDDp4sxlcjERNTKGL5uueXG77WMcxqK4cont0:VyPDDp4sxqyxzhemuxqlt0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-