General
-
Target
235bffe2c0f345d889f02988eaed7406da7deace33f80d1d45222cb1efccfeb4
-
Size
540KB
-
Sample
230324-n7qv7aeb63
-
MD5
7b60ac1f405691757983342752d510bb
-
SHA1
12def8974d0bfaac3b77f8125375850b4b21aa90
-
SHA256
235bffe2c0f345d889f02988eaed7406da7deace33f80d1d45222cb1efccfeb4
-
SHA512
1417a3e3db6dbdf5215b70dce68b9a0a57f967d386dc30621f464aed6d6f8df4715b76dc26f7aef17b13071327db4cadd5bb3cbe700bea46ae14c9ef6201530d
-
SSDEEP
12288:zMrVy90/4HQ+bL7Za8MQdZX39Uo8QCUdgEKrTm:Kyx5A8MQdZX98sdgvrq
Static task
static1
Behavioral task
behavioral1
Sample
235bffe2c0f345d889f02988eaed7406da7deace33f80d1d45222cb1efccfeb4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
235bffe2c0f345d889f02988eaed7406da7deace33f80d1d45222cb1efccfeb4
-
Size
540KB
-
MD5
7b60ac1f405691757983342752d510bb
-
SHA1
12def8974d0bfaac3b77f8125375850b4b21aa90
-
SHA256
235bffe2c0f345d889f02988eaed7406da7deace33f80d1d45222cb1efccfeb4
-
SHA512
1417a3e3db6dbdf5215b70dce68b9a0a57f967d386dc30621f464aed6d6f8df4715b76dc26f7aef17b13071327db4cadd5bb3cbe700bea46ae14c9ef6201530d
-
SSDEEP
12288:zMrVy90/4HQ+bL7Za8MQdZX39Uo8QCUdgEKrTm:Kyx5A8MQdZX98sdgvrq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-