General
-
Target
619b4d1fa464ce7ed3b1d069953925e0827fe42d5575679e287be9217410c0c5
-
Size
539KB
-
Sample
230324-mhcrlafg5v
-
MD5
f6546f1099adb306077d7e40fb51a945
-
SHA1
d2e25f6d52a9f59a3769a3970558d4ab4e944a9a
-
SHA256
619b4d1fa464ce7ed3b1d069953925e0827fe42d5575679e287be9217410c0c5
-
SHA512
e08a383072d671767154ce5ea43b08ef270e60b74206a8c73e3b7ce77700ed629340ecffce90b74998f0b8c979a9437ae8ceee8bab0004f89be2a177a00fd20c
-
SSDEEP
12288:XMrIy90ON8KPzUmTg0Hh2YZYhxjI4+39mqB1yUKPPL:nyVImTg0HhnZYDONdyDPPL
Static task
static1
Behavioral task
behavioral1
Sample
619b4d1fa464ce7ed3b1d069953925e0827fe42d5575679e287be9217410c0c5.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Targets
-
-
Target
619b4d1fa464ce7ed3b1d069953925e0827fe42d5575679e287be9217410c0c5
-
Size
539KB
-
MD5
f6546f1099adb306077d7e40fb51a945
-
SHA1
d2e25f6d52a9f59a3769a3970558d4ab4e944a9a
-
SHA256
619b4d1fa464ce7ed3b1d069953925e0827fe42d5575679e287be9217410c0c5
-
SHA512
e08a383072d671767154ce5ea43b08ef270e60b74206a8c73e3b7ce77700ed629340ecffce90b74998f0b8c979a9437ae8ceee8bab0004f89be2a177a00fd20c
-
SSDEEP
12288:XMrIy90ON8KPzUmTg0Hh2YZYhxjI4+39mqB1yUKPPL:nyVImTg0HhnZYDONdyDPPL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-