General
-
Target
546e22ce77083563891d1f9c420b89485e6c700972d0888cfca8195c58eb1971
-
Size
538KB
-
Sample
230324-j7261afc3v
-
MD5
ce8d1452719ed4730ecfd27ca89de3aa
-
SHA1
3d16d0922f9428aaa6e9e2f1031edea8d7b2f0be
-
SHA256
546e22ce77083563891d1f9c420b89485e6c700972d0888cfca8195c58eb1971
-
SHA512
e921a66b74f7d46af44a0df1bb9855eeda5381dfe909c4fce95c0d89b643b506f699be4ec3d1e6bd157a3a6717b7da3175315bfdf062d9a084016fecee835df6
-
SSDEEP
12288:eMr8y90bz3MaLwKWxk5223YGxgI4+XaeLKXngrdzGWW1:GyEzcaqy5B3YGNqZ3gzGWW1
Static task
static1
Behavioral task
behavioral1
Sample
546e22ce77083563891d1f9c420b89485e6c700972d0888cfca8195c58eb1971.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
546e22ce77083563891d1f9c420b89485e6c700972d0888cfca8195c58eb1971
-
Size
538KB
-
MD5
ce8d1452719ed4730ecfd27ca89de3aa
-
SHA1
3d16d0922f9428aaa6e9e2f1031edea8d7b2f0be
-
SHA256
546e22ce77083563891d1f9c420b89485e6c700972d0888cfca8195c58eb1971
-
SHA512
e921a66b74f7d46af44a0df1bb9855eeda5381dfe909c4fce95c0d89b643b506f699be4ec3d1e6bd157a3a6717b7da3175315bfdf062d9a084016fecee835df6
-
SSDEEP
12288:eMr8y90bz3MaLwKWxk5223YGxgI4+XaeLKXngrdzGWW1:GyEzcaqy5B3YGNqZ3gzGWW1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-