General
-
Target
07a8e4f0a5ee99ca5ca16b9d5d57394f818023380b581e991a1d443c7e7ddb1a
-
Size
680KB
-
Sample
230324-n292waea96
-
MD5
ff65b788afa76d49dec91502534d2eff
-
SHA1
213c6df7c7936a8e59a4acf522a9512aa6b8200f
-
SHA256
07a8e4f0a5ee99ca5ca16b9d5d57394f818023380b581e991a1d443c7e7ddb1a
-
SHA512
d88eebdee27438789103e74d9f3cc9f2608a039c3ef572942f2214ccec22ffb3954d479c472b0a7aa6e6c7e5c7624d5ff58132516e23db8a6fb6ecb595e980b1
-
SSDEEP
12288:0mMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:o2HD26KieG1Xs/E6F7mJqlBCKHI
Static task
static1
Behavioral task
behavioral1
Sample
07a8e4f0a5ee99ca5ca16b9d5d57394f818023380b581e991a1d443c7e7ddb1a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
07a8e4f0a5ee99ca5ca16b9d5d57394f818023380b581e991a1d443c7e7ddb1a
-
Size
680KB
-
MD5
ff65b788afa76d49dec91502534d2eff
-
SHA1
213c6df7c7936a8e59a4acf522a9512aa6b8200f
-
SHA256
07a8e4f0a5ee99ca5ca16b9d5d57394f818023380b581e991a1d443c7e7ddb1a
-
SHA512
d88eebdee27438789103e74d9f3cc9f2608a039c3ef572942f2214ccec22ffb3954d479c472b0a7aa6e6c7e5c7624d5ff58132516e23db8a6fb6ecb595e980b1
-
SSDEEP
12288:0mMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:o2HD26KieG1Xs/E6F7mJqlBCKHI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-