General
-
Target
e75a238bad5043d7c333b4869540d0e451b70ea3bfbdd712c3542e5938445f85
-
Size
540KB
-
Sample
230324-n4ad2aeb33
-
MD5
ed7703bd6899cd4f9cfb42039b8e1819
-
SHA1
ff867f573889cd0618af7295a71b078fd364f008
-
SHA256
e75a238bad5043d7c333b4869540d0e451b70ea3bfbdd712c3542e5938445f85
-
SHA512
c67370fa92b866e4d7a7d6c60d9db4140a74823d62afd8751360c2e3fd25b026c29fcb7f405ac047ba1be131fd11ea3698d2b4d3c981dd83d5992361b34704ac
-
SSDEEP
12288:pMruy904tgyNJmS+6D82KY9UvQyCdmnQ8OCepu3b:HyzpCQD82yQPgONc
Static task
static1
Behavioral task
behavioral1
Sample
e75a238bad5043d7c333b4869540d0e451b70ea3bfbdd712c3542e5938445f85.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
e75a238bad5043d7c333b4869540d0e451b70ea3bfbdd712c3542e5938445f85
-
Size
540KB
-
MD5
ed7703bd6899cd4f9cfb42039b8e1819
-
SHA1
ff867f573889cd0618af7295a71b078fd364f008
-
SHA256
e75a238bad5043d7c333b4869540d0e451b70ea3bfbdd712c3542e5938445f85
-
SHA512
c67370fa92b866e4d7a7d6c60d9db4140a74823d62afd8751360c2e3fd25b026c29fcb7f405ac047ba1be131fd11ea3698d2b4d3c981dd83d5992361b34704ac
-
SSDEEP
12288:pMruy904tgyNJmS+6D82KY9UvQyCdmnQ8OCepu3b:HyzpCQD82yQPgONc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-