General
-
Target
aaa7d81fe7e6ec0a5876d502c69d1a53da44edc1ccfe317d8c10a78465d86c75
-
Size
539KB
-
Sample
230324-ngdg6sdh74
-
MD5
feda1de2234db0932cbb497e8374c342
-
SHA1
d3b7508324fea456320961a11559cd6af73aed60
-
SHA256
aaa7d81fe7e6ec0a5876d502c69d1a53da44edc1ccfe317d8c10a78465d86c75
-
SHA512
94abd79a4933b112da939d39b52d3b06307e4277a7b8ceaa5096840d6092b3492af753e012a93c5adca9a0478ae2579e03213908ff2c2936f29f96741b4cee73
-
SSDEEP
12288:NMrKy90PrcXM1hrwPrR31xpkpqUNf1UgsA/NW6+9qkdkr:by6rV1+R1fkpqOf1UwFWp9qem
Static task
static1
Behavioral task
behavioral1
Sample
aaa7d81fe7e6ec0a5876d502c69d1a53da44edc1ccfe317d8c10a78465d86c75.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
aaa7d81fe7e6ec0a5876d502c69d1a53da44edc1ccfe317d8c10a78465d86c75
-
Size
539KB
-
MD5
feda1de2234db0932cbb497e8374c342
-
SHA1
d3b7508324fea456320961a11559cd6af73aed60
-
SHA256
aaa7d81fe7e6ec0a5876d502c69d1a53da44edc1ccfe317d8c10a78465d86c75
-
SHA512
94abd79a4933b112da939d39b52d3b06307e4277a7b8ceaa5096840d6092b3492af753e012a93c5adca9a0478ae2579e03213908ff2c2936f29f96741b4cee73
-
SSDEEP
12288:NMrKy90PrcXM1hrwPrR31xpkpqUNf1UgsA/NW6+9qkdkr:by6rV1+R1fkpqOf1UwFWp9qem
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-