General
-
Target
963bc9254aa65369572e787606c888423153f3e7d08014bcea02a024bd8a9bd2
-
Size
680KB
-
Sample
230324-j7a3hsdb29
-
MD5
6ea2f4a1bc2ee66db78dfddd70c5e0df
-
SHA1
33a9ce943ac67523a99539ab3adc84b58c61afbe
-
SHA256
963bc9254aa65369572e787606c888423153f3e7d08014bcea02a024bd8a9bd2
-
SHA512
4c30ace8130af2171c5ea654bcd7e6adc51a6e2f7a6b8d3c150bcef6409499d06c438e5e894e7f6eeaf02360f538accfd5d408e3cf27c2e233a6b76ee4fe6355
-
SSDEEP
12288:Bd898Pwj8PtYzZcDw15fuFlAGHroV43S3OSWGAozw2XeSeTRn:BT08PtIsuup4IO6oz5VC1
Static task
static1
Behavioral task
behavioral1
Sample
963bc9254aa65369572e787606c888423153f3e7d08014bcea02a024bd8a9bd2.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
963bc9254aa65369572e787606c888423153f3e7d08014bcea02a024bd8a9bd2
-
Size
680KB
-
MD5
6ea2f4a1bc2ee66db78dfddd70c5e0df
-
SHA1
33a9ce943ac67523a99539ab3adc84b58c61afbe
-
SHA256
963bc9254aa65369572e787606c888423153f3e7d08014bcea02a024bd8a9bd2
-
SHA512
4c30ace8130af2171c5ea654bcd7e6adc51a6e2f7a6b8d3c150bcef6409499d06c438e5e894e7f6eeaf02360f538accfd5d408e3cf27c2e233a6b76ee4fe6355
-
SSDEEP
12288:Bd898Pwj8PtYzZcDw15fuFlAGHroV43S3OSWGAozw2XeSeTRn:BT08PtIsuup4IO6oz5VC1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-