General
-
Target
2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c
-
Size
539KB
-
Sample
230324-j671vsfc3t
-
MD5
aee6ec98e68510fb95db5e295f0ae17b
-
SHA1
508df5c3e02d2919265309017c6e0c7ca1c92953
-
SHA256
2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c
-
SHA512
bae367520b359fbf271eef8f7558bc2630fea6696b2ac6a8673849cfc9c7cbd9ac6da52cd809e6a560a1bc06a6bb84856d4ac380e715714157089069ecb41def
-
SSDEEP
12288:zMr1y90g0AesSCwyOIvvnnWXYzxVI4+HgzvUGyGpniZ:yyYAesS67vnWXYtsA8GQZ
Static task
static1
Behavioral task
behavioral1
Sample
2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c
-
Size
539KB
-
MD5
aee6ec98e68510fb95db5e295f0ae17b
-
SHA1
508df5c3e02d2919265309017c6e0c7ca1c92953
-
SHA256
2866c6275e0277c04529e5462bf91dcc3886e5e6f728f6eca353e36e8d17878c
-
SHA512
bae367520b359fbf271eef8f7558bc2630fea6696b2ac6a8673849cfc9c7cbd9ac6da52cd809e6a560a1bc06a6bb84856d4ac380e715714157089069ecb41def
-
SSDEEP
12288:zMr1y90g0AesSCwyOIvvnnWXYzxVI4+HgzvUGyGpniZ:yyYAesS67vnWXYtsA8GQZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-