General
-
Target
43a1ec82378af868ebba81ffb015b5d2e91ef3864518f8749fd89e0a0ca1d441
-
Size
680KB
-
Sample
230324-nwphzsea72
-
MD5
aaf3b59407dac2b9d2916b2b66ee26ff
-
SHA1
899b31a7d00a857e053435d7d08cc35eb89a04e2
-
SHA256
43a1ec82378af868ebba81ffb015b5d2e91ef3864518f8749fd89e0a0ca1d441
-
SHA512
56543db10f6316c0a1ceed105cbc8d6c32da44dea2cc9338b5c1da5a3846878b714c41e01221ee902124531ff9fe118291e79e2cb282f816443f4512eed3a8bd
-
SSDEEP
12288:wmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:E2HD26KieG1Xs/E6F7mJqlBCKHI
Static task
static1
Behavioral task
behavioral1
Sample
43a1ec82378af868ebba81ffb015b5d2e91ef3864518f8749fd89e0a0ca1d441.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
43a1ec82378af868ebba81ffb015b5d2e91ef3864518f8749fd89e0a0ca1d441
-
Size
680KB
-
MD5
aaf3b59407dac2b9d2916b2b66ee26ff
-
SHA1
899b31a7d00a857e053435d7d08cc35eb89a04e2
-
SHA256
43a1ec82378af868ebba81ffb015b5d2e91ef3864518f8749fd89e0a0ca1d441
-
SHA512
56543db10f6316c0a1ceed105cbc8d6c32da44dea2cc9338b5c1da5a3846878b714c41e01221ee902124531ff9fe118291e79e2cb282f816443f4512eed3a8bd
-
SSDEEP
12288:wmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:E2HD26KieG1Xs/E6F7mJqlBCKHI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-