General
-
Target
3254681c39c8b8c3f02a793ecc7cced6d8f98b38a6405fc9d431736a024ff83a
-
Size
539KB
-
Sample
230324-mv1n7adg53
-
MD5
cdecbd222c515d6037c3e67df19653d1
-
SHA1
c064645df0e6d86de0560391523a47f3fb6d8958
-
SHA256
3254681c39c8b8c3f02a793ecc7cced6d8f98b38a6405fc9d431736a024ff83a
-
SHA512
3e30836df3807b0695d4630ab3cecf40be69abfdb2970dbd44fab9a9db6054145ccf991ccd32831a82f6a63a2416a6ce4d6a05062d4f7ae5ea29d01401bc5546
-
SSDEEP
12288:+MrIy90QiUKzznhnMgPawJgNn7YoxnI4+Jbtp2+hRFffXCOGkEm0t:6yLiUKfhMgywe7Y4yJvnSNm0t
Static task
static1
Behavioral task
behavioral1
Sample
3254681c39c8b8c3f02a793ecc7cced6d8f98b38a6405fc9d431736a024ff83a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
3254681c39c8b8c3f02a793ecc7cced6d8f98b38a6405fc9d431736a024ff83a
-
Size
539KB
-
MD5
cdecbd222c515d6037c3e67df19653d1
-
SHA1
c064645df0e6d86de0560391523a47f3fb6d8958
-
SHA256
3254681c39c8b8c3f02a793ecc7cced6d8f98b38a6405fc9d431736a024ff83a
-
SHA512
3e30836df3807b0695d4630ab3cecf40be69abfdb2970dbd44fab9a9db6054145ccf991ccd32831a82f6a63a2416a6ce4d6a05062d4f7ae5ea29d01401bc5546
-
SSDEEP
12288:+MrIy90QiUKzznhnMgPawJgNn7YoxnI4+Jbtp2+hRFffXCOGkEm0t:6yLiUKfhMgywe7Y4yJvnSNm0t
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-