General
-
Target
15ac086f07be9ada33cd8412f8d7d5840a35f9db68a4490e2d8cb70e67703ab2
-
Size
540KB
-
Sample
230324-pae8vsgc31
-
MD5
917dc70160a2452d16d4ba67d45e1b4a
-
SHA1
58f9dba55f6f19ad2a34cbe7c71441d98528b2c5
-
SHA256
15ac086f07be9ada33cd8412f8d7d5840a35f9db68a4490e2d8cb70e67703ab2
-
SHA512
cd8f7cf9224b43bfb331367b8a2c88d0c4dc7943910901db3a56041b57f557110c91fcf3558a5654d97824dae03bf29bf621deeb75647a3001da3641b3bc041e
-
SSDEEP
12288:MMrky90F6MkxI4l56+e9OaI9UQQkCk+8N2A8dBJ5:oys6MabOO/Q388dH
Static task
static1
Behavioral task
behavioral1
Sample
15ac086f07be9ada33cd8412f8d7d5840a35f9db68a4490e2d8cb70e67703ab2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
15ac086f07be9ada33cd8412f8d7d5840a35f9db68a4490e2d8cb70e67703ab2
-
Size
540KB
-
MD5
917dc70160a2452d16d4ba67d45e1b4a
-
SHA1
58f9dba55f6f19ad2a34cbe7c71441d98528b2c5
-
SHA256
15ac086f07be9ada33cd8412f8d7d5840a35f9db68a4490e2d8cb70e67703ab2
-
SHA512
cd8f7cf9224b43bfb331367b8a2c88d0c4dc7943910901db3a56041b57f557110c91fcf3558a5654d97824dae03bf29bf621deeb75647a3001da3641b3bc041e
-
SSDEEP
12288:MMrky90F6MkxI4l56+e9OaI9UQQkCk+8N2A8dBJ5:oys6MabOO/Q388dH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-