General
-
Target
e8e8ca7c8b98ef35d7d3e06ea37841c1b3ca9b80f48d75323f2f0f2bdd47a16e
-
Size
540KB
-
Sample
230324-jpmctsda38
-
MD5
34b5a41e68cf7c922bf88dd941995d19
-
SHA1
7f81ece6b2b7871a02f31a249ade07f3ba897c09
-
SHA256
e8e8ca7c8b98ef35d7d3e06ea37841c1b3ca9b80f48d75323f2f0f2bdd47a16e
-
SHA512
541051fdb85b2e4f5023ed403c7ea70f560b2c73f4cb9f22e25395558335804ec9dfa389ebc440aca040a662803993be1371337d5514f85935e6d498faac31ec
-
SSDEEP
12288:uMrsy90I7dyt+PcRm93JC/+9f7M6Fj6lL4yH51Gn3Yg+H:+yNIccRQjFj6lL4yK3f+H
Static task
static1
Behavioral task
behavioral1
Sample
e8e8ca7c8b98ef35d7d3e06ea37841c1b3ca9b80f48d75323f2f0f2bdd47a16e.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
e8e8ca7c8b98ef35d7d3e06ea37841c1b3ca9b80f48d75323f2f0f2bdd47a16e
-
Size
540KB
-
MD5
34b5a41e68cf7c922bf88dd941995d19
-
SHA1
7f81ece6b2b7871a02f31a249ade07f3ba897c09
-
SHA256
e8e8ca7c8b98ef35d7d3e06ea37841c1b3ca9b80f48d75323f2f0f2bdd47a16e
-
SHA512
541051fdb85b2e4f5023ed403c7ea70f560b2c73f4cb9f22e25395558335804ec9dfa389ebc440aca040a662803993be1371337d5514f85935e6d498faac31ec
-
SSDEEP
12288:uMrsy90I7dyt+PcRm93JC/+9f7M6Fj6lL4yH51Gn3Yg+H:+yNIccRQjFj6lL4yK3f+H
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-