General
-
Target
3130532bd61c1c4481bfb0d3b731ded11362f37fc64a1b1b9e37c260a31b8a3c
-
Size
681KB
-
Sample
230324-na5cbaga2z
-
MD5
02b33ab68b27fea72f4b7e5eb1015743
-
SHA1
e1ca427affa1f5b2cb326bc524867e94b4325678
-
SHA256
3130532bd61c1c4481bfb0d3b731ded11362f37fc64a1b1b9e37c260a31b8a3c
-
SHA512
6c6f43eec12c220523f65c2fd467885720170c101df4033dccba2c8c5f2c98e8f8998ba58188d207cf165f642d7fc6b18fa48e62001602c22581ceb8875f314f
-
SSDEEP
12288:zPe+vq0DftpGsNquO1jdfm6ttNA7XTPlszMd8wNYyRD:LrftpIjdjNA7xYMrl
Static task
static1
Behavioral task
behavioral1
Sample
3130532bd61c1c4481bfb0d3b731ded11362f37fc64a1b1b9e37c260a31b8a3c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
3130532bd61c1c4481bfb0d3b731ded11362f37fc64a1b1b9e37c260a31b8a3c
-
Size
681KB
-
MD5
02b33ab68b27fea72f4b7e5eb1015743
-
SHA1
e1ca427affa1f5b2cb326bc524867e94b4325678
-
SHA256
3130532bd61c1c4481bfb0d3b731ded11362f37fc64a1b1b9e37c260a31b8a3c
-
SHA512
6c6f43eec12c220523f65c2fd467885720170c101df4033dccba2c8c5f2c98e8f8998ba58188d207cf165f642d7fc6b18fa48e62001602c22581ceb8875f314f
-
SSDEEP
12288:zPe+vq0DftpGsNquO1jdfm6ttNA7XTPlszMd8wNYyRD:LrftpIjdjNA7xYMrl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-