General
-
Target
022f57c475c5b3c62cfca3089cb7f9efe82c1c6a798c05b97ac9ee53d4d65e87
-
Size
540KB
-
Sample
230324-jwnjgada65
-
MD5
fc5206850416fb4f95d3e56274e49580
-
SHA1
748dc1134bd55b146abdf090e4bb0b436473aa45
-
SHA256
022f57c475c5b3c62cfca3089cb7f9efe82c1c6a798c05b97ac9ee53d4d65e87
-
SHA512
98bdac9d51db2268b2f81eba5634146e8780ae2303dbf2a8c2a246dac247e3c5ae4bbf56b535fff960389ac2fe09e7bec3623b7bea18178f49732d507e45c102
-
SSDEEP
12288:zMriy90aB9boZJYGSsP9LAhNngM1IcRTd7BDW+W9h:xy/waoLAhbIcRTd7wB
Static task
static1
Behavioral task
behavioral1
Sample
022f57c475c5b3c62cfca3089cb7f9efe82c1c6a798c05b97ac9ee53d4d65e87.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
022f57c475c5b3c62cfca3089cb7f9efe82c1c6a798c05b97ac9ee53d4d65e87
-
Size
540KB
-
MD5
fc5206850416fb4f95d3e56274e49580
-
SHA1
748dc1134bd55b146abdf090e4bb0b436473aa45
-
SHA256
022f57c475c5b3c62cfca3089cb7f9efe82c1c6a798c05b97ac9ee53d4d65e87
-
SHA512
98bdac9d51db2268b2f81eba5634146e8780ae2303dbf2a8c2a246dac247e3c5ae4bbf56b535fff960389ac2fe09e7bec3623b7bea18178f49732d507e45c102
-
SSDEEP
12288:zMriy90aB9boZJYGSsP9LAhNngM1IcRTd7BDW+W9h:xy/waoLAhbIcRTd7wB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-