General
-
Target
408a4c3239a663dbb8a9720867b835c5ba2fbf1c1c023424d1d212af129ece0f
-
Size
539KB
-
Sample
230324-kkj8cafd2v
-
MD5
b9b4f8a39c8fed7947ed7f6ed729c78c
-
SHA1
b177ef5af5df3d6412e1d998d442ee510da57429
-
SHA256
408a4c3239a663dbb8a9720867b835c5ba2fbf1c1c023424d1d212af129ece0f
-
SHA512
848c09385f598ec4c476896020641000031f17aced9eaa71b93ed07bf9c3b971815fb6da2fd4fca95615372db0cb4d70dd12077d4a0fc0a9223aaba4baf9ae94
-
SSDEEP
12288:EMrOy90kIMIFWWgUBmZizaYuxKI4+rof0mpGavcen+:SyWFLmZcaYejU7gavck+
Static task
static1
Behavioral task
behavioral1
Sample
408a4c3239a663dbb8a9720867b835c5ba2fbf1c1c023424d1d212af129ece0f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
408a4c3239a663dbb8a9720867b835c5ba2fbf1c1c023424d1d212af129ece0f
-
Size
539KB
-
MD5
b9b4f8a39c8fed7947ed7f6ed729c78c
-
SHA1
b177ef5af5df3d6412e1d998d442ee510da57429
-
SHA256
408a4c3239a663dbb8a9720867b835c5ba2fbf1c1c023424d1d212af129ece0f
-
SHA512
848c09385f598ec4c476896020641000031f17aced9eaa71b93ed07bf9c3b971815fb6da2fd4fca95615372db0cb4d70dd12077d4a0fc0a9223aaba4baf9ae94
-
SSDEEP
12288:EMrOy90kIMIFWWgUBmZizaYuxKI4+rof0mpGavcen+:SyWFLmZcaYejU7gavck+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-