General
-
Target
6bb8d8629d3dd1052c023fab520b5529389e53994dcb892461856c3fd9ca1253
-
Size
539KB
-
Sample
230324-j2t87sda89
-
MD5
aeea97ad272445c5e307f4df37fdc215
-
SHA1
567fb8c2cb71c959010e78eb707eb8881a9b89b9
-
SHA256
6bb8d8629d3dd1052c023fab520b5529389e53994dcb892461856c3fd9ca1253
-
SHA512
0b2b579c9470415fbe9888dcc66ded1d0866bf290f37713b0e99bb5004ba64a608903d263b98785d1c53e6292d165acd09d01d9be046c9c3111a025d6c2cf99a
-
SSDEEP
12288:mMriy90zIJC4/axfwGqaBFGxQt5Uf+MfCBgUV44hXQ:oyhlGBqg2CBgUV42Q
Static task
static1
Behavioral task
behavioral1
Sample
6bb8d8629d3dd1052c023fab520b5529389e53994dcb892461856c3fd9ca1253.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
6bb8d8629d3dd1052c023fab520b5529389e53994dcb892461856c3fd9ca1253
-
Size
539KB
-
MD5
aeea97ad272445c5e307f4df37fdc215
-
SHA1
567fb8c2cb71c959010e78eb707eb8881a9b89b9
-
SHA256
6bb8d8629d3dd1052c023fab520b5529389e53994dcb892461856c3fd9ca1253
-
SHA512
0b2b579c9470415fbe9888dcc66ded1d0866bf290f37713b0e99bb5004ba64a608903d263b98785d1c53e6292d165acd09d01d9be046c9c3111a025d6c2cf99a
-
SSDEEP
12288:mMriy90zIJC4/axfwGqaBFGxQt5Uf+MfCBgUV44hXQ:oyhlGBqg2CBgUV42Q
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-