General
-
Target
cc0da2fc2643dd3d1360668867006fc257f3ec03a6603c0f30e8b52cfe4833db
-
Size
540KB
-
Sample
230324-nlldksga71
-
MD5
63fa4e25b58a0881117896d562d23823
-
SHA1
bbaf5afbdbe31216f2cbf886f8a894cac763b063
-
SHA256
cc0da2fc2643dd3d1360668867006fc257f3ec03a6603c0f30e8b52cfe4833db
-
SHA512
4e0ee4c8687c2bbc14b1a9f34360d79ba14b458f07f6ea18c9effd5185f1b58c97504f49c3b3b98bc39c1983df30f4abbb86cfd6a7c344813ee57f41e77917d1
-
SSDEEP
12288:NMr+y90OewaexoIVU+UNJ7ggshDpw078NXihRH:7yD++OJ7gR1qNXiP
Static task
static1
Behavioral task
behavioral1
Sample
cc0da2fc2643dd3d1360668867006fc257f3ec03a6603c0f30e8b52cfe4833db.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
cc0da2fc2643dd3d1360668867006fc257f3ec03a6603c0f30e8b52cfe4833db
-
Size
540KB
-
MD5
63fa4e25b58a0881117896d562d23823
-
SHA1
bbaf5afbdbe31216f2cbf886f8a894cac763b063
-
SHA256
cc0da2fc2643dd3d1360668867006fc257f3ec03a6603c0f30e8b52cfe4833db
-
SHA512
4e0ee4c8687c2bbc14b1a9f34360d79ba14b458f07f6ea18c9effd5185f1b58c97504f49c3b3b98bc39c1983df30f4abbb86cfd6a7c344813ee57f41e77917d1
-
SSDEEP
12288:NMr+y90OewaexoIVU+UNJ7ggshDpw078NXihRH:7yD++OJ7gR1qNXiP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-