General
-
Target
7d92212fc6b2b4abb416f51291ceee7117bd9e3e4c88eaa891b53142c9bc54d6
-
Size
539KB
-
Sample
230324-j78zjsdb36
-
MD5
2aef574a0b089c35af67e73655a381d5
-
SHA1
ec66a620528cb96484396ea798077b7f6500281d
-
SHA256
7d92212fc6b2b4abb416f51291ceee7117bd9e3e4c88eaa891b53142c9bc54d6
-
SHA512
9df19734fc28ee44eca0169b25806a1ff434614e438c808145c7a57e9a85fa2577e4ee317b9eaef02870dc19fa279094ccb1c628c25f49cfa930925db3c77ee6
-
SSDEEP
12288:nMrhy90FpOxrOBwGjYxx9I4+jQ4tCbqw:KyPKBPjYzUk4tEB
Static task
static1
Behavioral task
behavioral1
Sample
7d92212fc6b2b4abb416f51291ceee7117bd9e3e4c88eaa891b53142c9bc54d6.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Targets
-
-
Target
7d92212fc6b2b4abb416f51291ceee7117bd9e3e4c88eaa891b53142c9bc54d6
-
Size
539KB
-
MD5
2aef574a0b089c35af67e73655a381d5
-
SHA1
ec66a620528cb96484396ea798077b7f6500281d
-
SHA256
7d92212fc6b2b4abb416f51291ceee7117bd9e3e4c88eaa891b53142c9bc54d6
-
SHA512
9df19734fc28ee44eca0169b25806a1ff434614e438c808145c7a57e9a85fa2577e4ee317b9eaef02870dc19fa279094ccb1c628c25f49cfa930925db3c77ee6
-
SSDEEP
12288:nMrhy90FpOxrOBwGjYxx9I4+jQ4tCbqw:KyPKBPjYzUk4tEB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-