General
-
Target
60c7ef51637123a6d4ee8b62de9c8b7106b0ec1644c56e874e0dc5731ba87a86
-
Size
680KB
-
Sample
230324-p9twasge2y
-
MD5
9ab19b524bb50aedc08b3fb1049a5f47
-
SHA1
d282f1546d14bf24a46d0effdd89d72bc8e354d5
-
SHA256
60c7ef51637123a6d4ee8b62de9c8b7106b0ec1644c56e874e0dc5731ba87a86
-
SHA512
9553388bfd1d3b200447693e8719081b621491998f018bc724847404b4de2e150e004ea0acdb733efd6b2b8d37858dfc454419a73bd30b48cf95443811d76f7a
-
SSDEEP
12288:MmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:g2HD26KieG1Xs/E6F7mJqlBCKHI
Static task
static1
Behavioral task
behavioral1
Sample
60c7ef51637123a6d4ee8b62de9c8b7106b0ec1644c56e874e0dc5731ba87a86.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
60c7ef51637123a6d4ee8b62de9c8b7106b0ec1644c56e874e0dc5731ba87a86
-
Size
680KB
-
MD5
9ab19b524bb50aedc08b3fb1049a5f47
-
SHA1
d282f1546d14bf24a46d0effdd89d72bc8e354d5
-
SHA256
60c7ef51637123a6d4ee8b62de9c8b7106b0ec1644c56e874e0dc5731ba87a86
-
SHA512
9553388bfd1d3b200447693e8719081b621491998f018bc724847404b4de2e150e004ea0acdb733efd6b2b8d37858dfc454419a73bd30b48cf95443811d76f7a
-
SSDEEP
12288:MmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:g2HD26KieG1Xs/E6F7mJqlBCKHI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-