General
-
Target
04689f6d8ba79396668eee19cba2f0e9334040d5314f10609dc42ef5ff633826
-
Size
539KB
-
Sample
230324-m856tsga2s
-
MD5
ddb438b4eed71eabb9f7ce4ef7648d2f
-
SHA1
6ea6f712248280b14814bf6c5abe0cdd77d109ed
-
SHA256
04689f6d8ba79396668eee19cba2f0e9334040d5314f10609dc42ef5ff633826
-
SHA512
9581a7e2d6f6bbb871b8e31c7897f49974f219731c88a4b7d3cbd44f7bbd2fbb96c038f32384f43d041a178bf814267ccaa89609d32e3cced91ece00131787e6
-
SSDEEP
12288:1MrEy90FjQYeP30LEHxCUNEQegsNXpZfXmz+:FyRDP30LO8OEQe9fOy
Static task
static1
Behavioral task
behavioral1
Sample
04689f6d8ba79396668eee19cba2f0e9334040d5314f10609dc42ef5ff633826.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
04689f6d8ba79396668eee19cba2f0e9334040d5314f10609dc42ef5ff633826
-
Size
539KB
-
MD5
ddb438b4eed71eabb9f7ce4ef7648d2f
-
SHA1
6ea6f712248280b14814bf6c5abe0cdd77d109ed
-
SHA256
04689f6d8ba79396668eee19cba2f0e9334040d5314f10609dc42ef5ff633826
-
SHA512
9581a7e2d6f6bbb871b8e31c7897f49974f219731c88a4b7d3cbd44f7bbd2fbb96c038f32384f43d041a178bf814267ccaa89609d32e3cced91ece00131787e6
-
SSDEEP
12288:1MrEy90FjQYeP30LEHxCUNEQegsNXpZfXmz+:FyRDP30LO8OEQe9fOy
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-