General
-
Target
bf159934011a7ad644e2e7ce4a3bccfb8ad8533cb3379d71a7a38231ef1aec00
-
Size
680KB
-
Sample
230324-klgtlsfd21
-
MD5
cfbf4f9808ac42ae24cb481c738f5f9c
-
SHA1
84a4e480ab2eb99cf885b94753de8236b960d57a
-
SHA256
bf159934011a7ad644e2e7ce4a3bccfb8ad8533cb3379d71a7a38231ef1aec00
-
SHA512
099b0cba4918c381c1b4c5feaca312e1d4f605605a5e5b2e80206c6074261a777572ebf92f7fee5a32088e939ae83f2e5169ce9c589382558b2250ed070fbdcc
-
SSDEEP
12288:Gd898Pwj8PtYzZcDw15fuFlAGHroV43S3OSWGAozw2XeSeTRn:GT08PtIsuup4IO6oz5VC1
Static task
static1
Behavioral task
behavioral1
Sample
bf159934011a7ad644e2e7ce4a3bccfb8ad8533cb3379d71a7a38231ef1aec00.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
bf159934011a7ad644e2e7ce4a3bccfb8ad8533cb3379d71a7a38231ef1aec00
-
Size
680KB
-
MD5
cfbf4f9808ac42ae24cb481c738f5f9c
-
SHA1
84a4e480ab2eb99cf885b94753de8236b960d57a
-
SHA256
bf159934011a7ad644e2e7ce4a3bccfb8ad8533cb3379d71a7a38231ef1aec00
-
SHA512
099b0cba4918c381c1b4c5feaca312e1d4f605605a5e5b2e80206c6074261a777572ebf92f7fee5a32088e939ae83f2e5169ce9c589382558b2250ed070fbdcc
-
SSDEEP
12288:Gd898Pwj8PtYzZcDw15fuFlAGHroV43S3OSWGAozw2XeSeTRn:GT08PtIsuup4IO6oz5VC1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-