General
-
Target
fcf06797e7c2320ccadff1d20c1391c3073496aa298423a1560956565323ca55
-
Size
539KB
-
Sample
230324-kv3sfafd6w
-
MD5
c85639ae21265e487ac2263926911df7
-
SHA1
375fa9d3298cff8c9e807d03837cff5f80e5800e
-
SHA256
fcf06797e7c2320ccadff1d20c1391c3073496aa298423a1560956565323ca55
-
SHA512
f4cc91f26e01cacb6201a1100a68a6cbf96e8fedd842516f5994e6401202e222650e9312bba94697e66b4b9e6cdd8f8b22033a2168d8f8a2e90a009694761bab
-
SSDEEP
12288:KMrky90EaACstoFOuCT0XBn52EpYBxlI4+cMQWN5upHtsmFk:aywwo8Vm53pYjcpQWnuVmv
Static task
static1
Behavioral task
behavioral1
Sample
fcf06797e7c2320ccadff1d20c1391c3073496aa298423a1560956565323ca55.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
fcf06797e7c2320ccadff1d20c1391c3073496aa298423a1560956565323ca55
-
Size
539KB
-
MD5
c85639ae21265e487ac2263926911df7
-
SHA1
375fa9d3298cff8c9e807d03837cff5f80e5800e
-
SHA256
fcf06797e7c2320ccadff1d20c1391c3073496aa298423a1560956565323ca55
-
SHA512
f4cc91f26e01cacb6201a1100a68a6cbf96e8fedd842516f5994e6401202e222650e9312bba94697e66b4b9e6cdd8f8b22033a2168d8f8a2e90a009694761bab
-
SSDEEP
12288:KMrky90EaACstoFOuCT0XBn52EpYBxlI4+cMQWN5upHtsmFk:aywwo8Vm53pYjcpQWnuVmv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-