General
-
Target
8725b5a6345dee01717c8f319d32419cd78353ed4f73332b8195655907b9f9fc
-
Size
680KB
-
Sample
230324-msv1xsdg43
-
MD5
105df3ec6ce9cf8f9acd11d2abe5905e
-
SHA1
7acadc5a4b7b2a91a17f304c2770456c157e3d92
-
SHA256
8725b5a6345dee01717c8f319d32419cd78353ed4f73332b8195655907b9f9fc
-
SHA512
f3c5c998490cd7beca427b768a9f264ae8e10f2a21d7f53db4d8a3b4543461683b2eeb2a33b9db4a28dd6d2796e0f6dc89bc2063f10489bab7443b379a45e21c
-
SSDEEP
12288:zd898Pwj8PtYzZcDw15fuFlAGHroV43S3OSWGAozw2XeSeTRn:zT08PtIsuup4IO6oz5VC1
Static task
static1
Behavioral task
behavioral1
Sample
8725b5a6345dee01717c8f319d32419cd78353ed4f73332b8195655907b9f9fc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
8725b5a6345dee01717c8f319d32419cd78353ed4f73332b8195655907b9f9fc
-
Size
680KB
-
MD5
105df3ec6ce9cf8f9acd11d2abe5905e
-
SHA1
7acadc5a4b7b2a91a17f304c2770456c157e3d92
-
SHA256
8725b5a6345dee01717c8f319d32419cd78353ed4f73332b8195655907b9f9fc
-
SHA512
f3c5c998490cd7beca427b768a9f264ae8e10f2a21d7f53db4d8a3b4543461683b2eeb2a33b9db4a28dd6d2796e0f6dc89bc2063f10489bab7443b379a45e21c
-
SSDEEP
12288:zd898Pwj8PtYzZcDw15fuFlAGHroV43S3OSWGAozw2XeSeTRn:zT08PtIsuup4IO6oz5VC1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-