General
-
Target
31cf5f6e712eb65f7aee82e4362da66b0210d276083c55c791f5fe37524b7490
-
Size
540KB
-
Sample
230324-m2arcafh6s
-
MD5
0de64afaade53b44d5a9bd22f011ad5c
-
SHA1
9c87ff867ca50f289fc32017f7602353774a0c4e
-
SHA256
31cf5f6e712eb65f7aee82e4362da66b0210d276083c55c791f5fe37524b7490
-
SHA512
e507d2771de12cac9353db69fe0dac03b6b4dcaa951b67f59e199b1883dc510fc81504518aaead13f25df0ef226da5ebb8d20e5b1966afe2937a370a696c1d32
-
SSDEEP
12288:RMrQy90SsA25xEUgGBLKQHKeTc/4gUvmi0+wYPu8aI:dy7HOxEyL+4Lmi0+hu8aI
Static task
static1
Behavioral task
behavioral1
Sample
31cf5f6e712eb65f7aee82e4362da66b0210d276083c55c791f5fe37524b7490.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
31cf5f6e712eb65f7aee82e4362da66b0210d276083c55c791f5fe37524b7490
-
Size
540KB
-
MD5
0de64afaade53b44d5a9bd22f011ad5c
-
SHA1
9c87ff867ca50f289fc32017f7602353774a0c4e
-
SHA256
31cf5f6e712eb65f7aee82e4362da66b0210d276083c55c791f5fe37524b7490
-
SHA512
e507d2771de12cac9353db69fe0dac03b6b4dcaa951b67f59e199b1883dc510fc81504518aaead13f25df0ef226da5ebb8d20e5b1966afe2937a370a696c1d32
-
SSDEEP
12288:RMrQy90SsA25xEUgGBLKQHKeTc/4gUvmi0+wYPu8aI:dy7HOxEyL+4Lmi0+hu8aI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-