General
-
Target
5590daedf245e8aa85c5b6e81ef8e4466325ff5516c0618385801788d20521fd
-
Size
540KB
-
Sample
230324-jgnkxsfa7y
-
MD5
7710d5e5ce7d5dbaa5cede6622cba24b
-
SHA1
c4fd95808e11933c412d1e0d4a46cde7d3e56e25
-
SHA256
5590daedf245e8aa85c5b6e81ef8e4466325ff5516c0618385801788d20521fd
-
SHA512
ca707a3575c91929c5fcd7cd32f804847b57c6bfa5cde7f3e6cecc9932ca2e7639575243dbbad044366f63e54d4e568184bcae2958a2a6b25c5162052a4c6d93
-
SSDEEP
12288:7MrQy907Z9GRVGKNuPMC0ZILwUtyZM0KF96GRdHFmhA:3ySfG7GKBZILOKF96CdHF+A
Static task
static1
Behavioral task
behavioral1
Sample
5590daedf245e8aa85c5b6e81ef8e4466325ff5516c0618385801788d20521fd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
5590daedf245e8aa85c5b6e81ef8e4466325ff5516c0618385801788d20521fd
-
Size
540KB
-
MD5
7710d5e5ce7d5dbaa5cede6622cba24b
-
SHA1
c4fd95808e11933c412d1e0d4a46cde7d3e56e25
-
SHA256
5590daedf245e8aa85c5b6e81ef8e4466325ff5516c0618385801788d20521fd
-
SHA512
ca707a3575c91929c5fcd7cd32f804847b57c6bfa5cde7f3e6cecc9932ca2e7639575243dbbad044366f63e54d4e568184bcae2958a2a6b25c5162052a4c6d93
-
SSDEEP
12288:7MrQy907Z9GRVGKNuPMC0ZILwUtyZM0KF96GRdHFmhA:3ySfG7GKBZILOKF96CdHF+A
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-