General
-
Target
fb106431c4d5002d9ef361db77966d04b0df73cf9396d724621ef04f39f34a57
-
Size
539KB
-
Sample
230324-kaha1afc4y
-
MD5
14ab0baf30cc265698dd35251724f54c
-
SHA1
0c9c49bb56eef40cf7752c6f82333d8f941661e1
-
SHA256
fb106431c4d5002d9ef361db77966d04b0df73cf9396d724621ef04f39f34a57
-
SHA512
54da7b1d6828b3c82e6c2b60999a92b998672283f03f6856a0dc0e4309f86b2cf5f9c08188b0c451768d5e563538a5056c5da7dde1efab19132d55b4819ce876
-
SSDEEP
12288:lMruy90B9oub4BNMggp6+YaxaI4+VWFmFZLk7sQ0I2:/yDubSmp6+Y6Tc6ZLEFZ2
Static task
static1
Behavioral task
behavioral1
Sample
fb106431c4d5002d9ef361db77966d04b0df73cf9396d724621ef04f39f34a57.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Targets
-
-
Target
fb106431c4d5002d9ef361db77966d04b0df73cf9396d724621ef04f39f34a57
-
Size
539KB
-
MD5
14ab0baf30cc265698dd35251724f54c
-
SHA1
0c9c49bb56eef40cf7752c6f82333d8f941661e1
-
SHA256
fb106431c4d5002d9ef361db77966d04b0df73cf9396d724621ef04f39f34a57
-
SHA512
54da7b1d6828b3c82e6c2b60999a92b998672283f03f6856a0dc0e4309f86b2cf5f9c08188b0c451768d5e563538a5056c5da7dde1efab19132d55b4819ce876
-
SSDEEP
12288:lMruy90B9oub4BNMggp6+YaxaI4+VWFmFZLk7sQ0I2:/yDubSmp6+Y6Tc6ZLEFZ2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-