General
-
Target
883af237145dbe439c2064877a2779a58036ff613db33c0df62374cf7b236b9c
-
Size
540KB
-
Sample
230324-mwtbhadg54
-
MD5
44c957f829d8a65b42ff3d4849bd6c2b
-
SHA1
15c9ae3174856edf6c13ee1f1c53b28a4894b56e
-
SHA256
883af237145dbe439c2064877a2779a58036ff613db33c0df62374cf7b236b9c
-
SHA512
b53b0d9e6ed8844408190904a7f20b086a9a7910608f48bfa0e2bad794fb19ddbb2349c33aef6bb044ca70994c296a3ffb6513cd245a80783ed1a3425b31c44a
-
SSDEEP
12288:sMrqy90P7yMOA9m6UcEmYViIbwexoI4+03cTbPD:2yJMOKB7EmQdbwuVakDD
Static task
static1
Behavioral task
behavioral1
Sample
883af237145dbe439c2064877a2779a58036ff613db33c0df62374cf7b236b9c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Targets
-
-
Target
883af237145dbe439c2064877a2779a58036ff613db33c0df62374cf7b236b9c
-
Size
540KB
-
MD5
44c957f829d8a65b42ff3d4849bd6c2b
-
SHA1
15c9ae3174856edf6c13ee1f1c53b28a4894b56e
-
SHA256
883af237145dbe439c2064877a2779a58036ff613db33c0df62374cf7b236b9c
-
SHA512
b53b0d9e6ed8844408190904a7f20b086a9a7910608f48bfa0e2bad794fb19ddbb2349c33aef6bb044ca70994c296a3ffb6513cd245a80783ed1a3425b31c44a
-
SSDEEP
12288:sMrqy90P7yMOA9m6UcEmYViIbwexoI4+03cTbPD:2yJMOKB7EmQdbwuVakDD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-