General
-
Target
efbe0942b077e0e44ab6104578f43f83d0866ffe98f499e3b84d40d814ecd9de
-
Size
539KB
-
Sample
230324-hyztvach23
-
MD5
e25085343ee979083a43e1512b5db9fd
-
SHA1
7fa8e83a5d5f1d0e8c88b0008ea5710483abed8d
-
SHA256
efbe0942b077e0e44ab6104578f43f83d0866ffe98f499e3b84d40d814ecd9de
-
SHA512
e3860ff64d26ca31c5c58b864087cb10a1cae017cf76f4061c2d63984cc5cbed07689658a77d19973c7dd65db35a522ae84246f2696ffbd4ee64e39c8c72f000
-
SSDEEP
12288:MMrTy903FZJ/KY+pn9sKiLVsSLHCM1W5n6nPYV+Q/kcu1oBI8BB:fyPY+F9s3tLrW5n6PYVuRHkB
Static task
static1
Behavioral task
behavioral1
Sample
efbe0942b077e0e44ab6104578f43f83d0866ffe98f499e3b84d40d814ecd9de.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
efbe0942b077e0e44ab6104578f43f83d0866ffe98f499e3b84d40d814ecd9de
-
Size
539KB
-
MD5
e25085343ee979083a43e1512b5db9fd
-
SHA1
7fa8e83a5d5f1d0e8c88b0008ea5710483abed8d
-
SHA256
efbe0942b077e0e44ab6104578f43f83d0866ffe98f499e3b84d40d814ecd9de
-
SHA512
e3860ff64d26ca31c5c58b864087cb10a1cae017cf76f4061c2d63984cc5cbed07689658a77d19973c7dd65db35a522ae84246f2696ffbd4ee64e39c8c72f000
-
SSDEEP
12288:MMrTy903FZJ/KY+pn9sKiLVsSLHCM1W5n6nPYV+Q/kcu1oBI8BB:fyPY+F9s3tLrW5n6PYVuRHkB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-