General
-
Target
a3fa1d1b695b493bdc5d881cd72bc94f0ef53f451c3297ed3cb82f139fd25ee6
-
Size
681KB
-
Sample
230324-m8apxsdh27
-
MD5
3b504ddbaedade5dfdb64adf06a84f7c
-
SHA1
b5cd5efb42d828a463fc7916c2972efc37307739
-
SHA256
a3fa1d1b695b493bdc5d881cd72bc94f0ef53f451c3297ed3cb82f139fd25ee6
-
SHA512
6f339ec049645caa6048f9727dddc9840af33654f573482eb4a6b6eedbc0e6c05b41290cf65cd0eab80dd3cb086bb26eeb761ba1c89d21a0e379b9e475a26238
-
SSDEEP
12288:nPe+vq0DftpGsNquO1jdfm6ttNA7XTPlszMd8wNYyRD:frftpIjdjNA7xYMrl
Static task
static1
Behavioral task
behavioral1
Sample
a3fa1d1b695b493bdc5d881cd72bc94f0ef53f451c3297ed3cb82f139fd25ee6.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
a3fa1d1b695b493bdc5d881cd72bc94f0ef53f451c3297ed3cb82f139fd25ee6
-
Size
681KB
-
MD5
3b504ddbaedade5dfdb64adf06a84f7c
-
SHA1
b5cd5efb42d828a463fc7916c2972efc37307739
-
SHA256
a3fa1d1b695b493bdc5d881cd72bc94f0ef53f451c3297ed3cb82f139fd25ee6
-
SHA512
6f339ec049645caa6048f9727dddc9840af33654f573482eb4a6b6eedbc0e6c05b41290cf65cd0eab80dd3cb086bb26eeb761ba1c89d21a0e379b9e475a26238
-
SSDEEP
12288:nPe+vq0DftpGsNquO1jdfm6ttNA7XTPlszMd8wNYyRD:frftpIjdjNA7xYMrl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-