General
-
Target
bd777e6733c0baf8fd380f20452fe7547652fef1025f2a260b9f8fd038d8e9d9
-
Size
538KB
-
Sample
230324-kvbzqadc38
-
MD5
3984f89f45122eeaf9d746c00843f6c4
-
SHA1
7d3c685ac099f578e44d746502f88b55e639805d
-
SHA256
bd777e6733c0baf8fd380f20452fe7547652fef1025f2a260b9f8fd038d8e9d9
-
SHA512
f6105434498e8515c4d26c3fd64e96eb5fb0b3e2246b06a703ed762e5f4cee3e1fec3664e733804e23d3fb47b40dc0f6c36d3b80d6590f1cf1497dacdbef5f84
-
SSDEEP
12288:nMrEy902crThU4pmBBwe7YexsI4+Y+RrOS41X2F8uynw:XyJkmBBz7YuJj141X2i8
Static task
static1
Behavioral task
behavioral1
Sample
bd777e6733c0baf8fd380f20452fe7547652fef1025f2a260b9f8fd038d8e9d9.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
bd777e6733c0baf8fd380f20452fe7547652fef1025f2a260b9f8fd038d8e9d9
-
Size
538KB
-
MD5
3984f89f45122eeaf9d746c00843f6c4
-
SHA1
7d3c685ac099f578e44d746502f88b55e639805d
-
SHA256
bd777e6733c0baf8fd380f20452fe7547652fef1025f2a260b9f8fd038d8e9d9
-
SHA512
f6105434498e8515c4d26c3fd64e96eb5fb0b3e2246b06a703ed762e5f4cee3e1fec3664e733804e23d3fb47b40dc0f6c36d3b80d6590f1cf1497dacdbef5f84
-
SSDEEP
12288:nMrEy902crThU4pmBBwe7YexsI4+Y+RrOS41X2F8uynw:XyJkmBBz7YuJj141X2i8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-