General
-
Target
c3da14682e672ce998081fbfbd40397c05e4655ed11f85cdbfa05063b669eedb
-
Size
681KB
-
Sample
230324-nnbxxsea28
-
MD5
7fa91fb8c33aa6141f432af58d77d822
-
SHA1
2fe669828f2bfb654193528b83a98359572cc05a
-
SHA256
c3da14682e672ce998081fbfbd40397c05e4655ed11f85cdbfa05063b669eedb
-
SHA512
51eca45d0c5e32768afe545861712b3928a1ac0ff6ed51f1d36c0232b3911eb870a9986ed42394cc7287922eeac55bee7ed6f9c5daa5b4b15fa0a93587d363ae
-
SSDEEP
12288:WPe+vq0DftpGsNquO1jdfm6ttNA7XTPlszMd8wNYyRD:OrftpIjdjNA7xYMrl
Static task
static1
Behavioral task
behavioral1
Sample
c3da14682e672ce998081fbfbd40397c05e4655ed11f85cdbfa05063b669eedb.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
c3da14682e672ce998081fbfbd40397c05e4655ed11f85cdbfa05063b669eedb
-
Size
681KB
-
MD5
7fa91fb8c33aa6141f432af58d77d822
-
SHA1
2fe669828f2bfb654193528b83a98359572cc05a
-
SHA256
c3da14682e672ce998081fbfbd40397c05e4655ed11f85cdbfa05063b669eedb
-
SHA512
51eca45d0c5e32768afe545861712b3928a1ac0ff6ed51f1d36c0232b3911eb870a9986ed42394cc7287922eeac55bee7ed6f9c5daa5b4b15fa0a93587d363ae
-
SSDEEP
12288:WPe+vq0DftpGsNquO1jdfm6ttNA7XTPlszMd8wNYyRD:OrftpIjdjNA7xYMrl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-