General
-
Target
f921bf5f937e2ecbb872a001b944dc082294c3d004c149e8e4363f4539695124
-
Size
539KB
-
Sample
230324-kpkdxadb98
-
MD5
092f2e02c114e3343185de3ca6c94b9b
-
SHA1
f20ba641f5d76c20f3144549ef1efedaf297e782
-
SHA256
f921bf5f937e2ecbb872a001b944dc082294c3d004c149e8e4363f4539695124
-
SHA512
e9a9fd40de5f787f483201ef0ded0af87824fdeaef4bd728e8d7f9328aed0efdcc32f344d857019e1027fd708b43054f4627cc02f9c91145728101fb42464173
-
SSDEEP
12288:wMrIy90stdgHPj4Mtzk7+h29GYYxOI4+6CLLU4zl0SgqJjI:oyNq4M9k7+h+GYInJHU9dAjI
Static task
static1
Behavioral task
behavioral1
Sample
f921bf5f937e2ecbb872a001b944dc082294c3d004c149e8e4363f4539695124.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Targets
-
-
Target
f921bf5f937e2ecbb872a001b944dc082294c3d004c149e8e4363f4539695124
-
Size
539KB
-
MD5
092f2e02c114e3343185de3ca6c94b9b
-
SHA1
f20ba641f5d76c20f3144549ef1efedaf297e782
-
SHA256
f921bf5f937e2ecbb872a001b944dc082294c3d004c149e8e4363f4539695124
-
SHA512
e9a9fd40de5f787f483201ef0ded0af87824fdeaef4bd728e8d7f9328aed0efdcc32f344d857019e1027fd708b43054f4627cc02f9c91145728101fb42464173
-
SSDEEP
12288:wMrIy90stdgHPj4Mtzk7+h29GYYxOI4+6CLLU4zl0SgqJjI:oyNq4M9k7+h+GYInJHU9dAjI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-