General
-
Target
fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23
-
Size
539KB
-
Sample
230324-k6tznsfd9z
-
MD5
dc4e50cb8ae63c30e37bb7c719b99b07
-
SHA1
a2418448e6097e666bf4984f4faff7ff5bfc8a73
-
SHA256
fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23
-
SHA512
a71b7819eda2aad78a394e094a4e29983bc3ff2d40bfd40ec4372fd8ff31229e9d95b6d003cc470e6bf2f32edc8031c7ba6ec7162ddda5bed2c5628517942f9f
-
SSDEEP
12288:XMryy90zZ5nAXIM++KWKimpsYUxsI4+vn5EQUq7fm1:lyE5nYKWKi2sYkJP5EQK
Static task
static1
Behavioral task
behavioral1
Sample
fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23
-
Size
539KB
-
MD5
dc4e50cb8ae63c30e37bb7c719b99b07
-
SHA1
a2418448e6097e666bf4984f4faff7ff5bfc8a73
-
SHA256
fca8b49ef98dc76d40daf9520c809282bbf38beaab3ea0c5c32bfb0d17b99f23
-
SHA512
a71b7819eda2aad78a394e094a4e29983bc3ff2d40bfd40ec4372fd8ff31229e9d95b6d003cc470e6bf2f32edc8031c7ba6ec7162ddda5bed2c5628517942f9f
-
SSDEEP
12288:XMryy90zZ5nAXIM++KWKimpsYUxsI4+vn5EQUq7fm1:lyE5nYKWKi2sYkJP5EQK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-