General
-
Target
3ffe6eb1ae5effc89af02aa6b9fecb3e790bcfc34f674975aa1e06af7026a443
-
Size
680KB
-
Sample
230324-m49nfsdg89
-
MD5
aa928de7b248d50c45b7bd71b648f03d
-
SHA1
61e80d9b7568275bfb4e926ec70c88227793aa96
-
SHA256
3ffe6eb1ae5effc89af02aa6b9fecb3e790bcfc34f674975aa1e06af7026a443
-
SHA512
165cc5512e593d1fa6d71041c00b2b07ae2b53d107c75688651dbe625ea636e3c2a20f8e09e998883b47a89baa59ff311f6a58bedbbde984617b59ee69d82fe5
-
SSDEEP
12288:FliBqa8L9z+9mDZ7wFwkEhZlR/zRbOXjTOpngeV6mxJDoh2rU0sRH:gqh96gDZ7VXhz4XHEngeV6mA5l
Static task
static1
Behavioral task
behavioral1
Sample
3ffe6eb1ae5effc89af02aa6b9fecb3e790bcfc34f674975aa1e06af7026a443.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
3ffe6eb1ae5effc89af02aa6b9fecb3e790bcfc34f674975aa1e06af7026a443
-
Size
680KB
-
MD5
aa928de7b248d50c45b7bd71b648f03d
-
SHA1
61e80d9b7568275bfb4e926ec70c88227793aa96
-
SHA256
3ffe6eb1ae5effc89af02aa6b9fecb3e790bcfc34f674975aa1e06af7026a443
-
SHA512
165cc5512e593d1fa6d71041c00b2b07ae2b53d107c75688651dbe625ea636e3c2a20f8e09e998883b47a89baa59ff311f6a58bedbbde984617b59ee69d82fe5
-
SSDEEP
12288:FliBqa8L9z+9mDZ7wFwkEhZlR/zRbOXjTOpngeV6mxJDoh2rU0sRH:gqh96gDZ7VXhz4XHEngeV6mA5l
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-