General
-
Target
6a4be25653fe60b2717d2949569a22e8c34f32fb504844421822add18010879a
-
Size
687KB
-
Sample
230324-jws4ysfb5v
-
MD5
4e08caab5e33ec01f0f4d34f5ab49de6
-
SHA1
00dbb00fda77e1f64389ed7bbffb23cb13f0d21b
-
SHA256
6a4be25653fe60b2717d2949569a22e8c34f32fb504844421822add18010879a
-
SHA512
6f699f2fcc290c41a085db26b7c83d558b5f9a28976a0a3dc65f800241c2c6eb7b657ef240d6387438580004068f80f841156dc060fe16976388b7251af7cf55
-
SSDEEP
12288:C3KZUuB2nyy4KS3el7XLT5a2uZdAeZ0lgt1Pf53IejQGR7:CrE2nyy4DQLLEJZdP06RYejZV
Static task
static1
Behavioral task
behavioral1
Sample
6a4be25653fe60b2717d2949569a22e8c34f32fb504844421822add18010879a.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
6a4be25653fe60b2717d2949569a22e8c34f32fb504844421822add18010879a
-
Size
687KB
-
MD5
4e08caab5e33ec01f0f4d34f5ab49de6
-
SHA1
00dbb00fda77e1f64389ed7bbffb23cb13f0d21b
-
SHA256
6a4be25653fe60b2717d2949569a22e8c34f32fb504844421822add18010879a
-
SHA512
6f699f2fcc290c41a085db26b7c83d558b5f9a28976a0a3dc65f800241c2c6eb7b657ef240d6387438580004068f80f841156dc060fe16976388b7251af7cf55
-
SSDEEP
12288:C3KZUuB2nyy4KS3el7XLT5a2uZdAeZ0lgt1Pf53IejQGR7:CrE2nyy4DQLLEJZdP06RYejZV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-