General
-
Target
74632f0030de97c6a5a956dd639a9ea4d4395a09d291f39da896768b07aae012
-
Size
540KB
-
Sample
230324-pc5arseb93
-
MD5
129747a6a6a544ba3208e1352db06b00
-
SHA1
14f48fbff352879cc7d80b418df79324e74f8489
-
SHA256
74632f0030de97c6a5a956dd639a9ea4d4395a09d291f39da896768b07aae012
-
SHA512
5a9a2f6cf7abdff72b57d8ed1c843b240df61104ea96b8f501824ee968e256ed6d22dde5369b470f4e8a1cb5ba7f1406a58f5172d66f424151cbf3b2cc3785f6
-
SSDEEP
12288:iMr8y90J68qFj7w3WXD74dnZSAzu9U3QNCZdSo7AJkFfMVF/X2:qytzj7HXf4dnZSAzQmdSo9oF/2
Static task
static1
Behavioral task
behavioral1
Sample
74632f0030de97c6a5a956dd639a9ea4d4395a09d291f39da896768b07aae012.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
74632f0030de97c6a5a956dd639a9ea4d4395a09d291f39da896768b07aae012
-
Size
540KB
-
MD5
129747a6a6a544ba3208e1352db06b00
-
SHA1
14f48fbff352879cc7d80b418df79324e74f8489
-
SHA256
74632f0030de97c6a5a956dd639a9ea4d4395a09d291f39da896768b07aae012
-
SHA512
5a9a2f6cf7abdff72b57d8ed1c843b240df61104ea96b8f501824ee968e256ed6d22dde5369b470f4e8a1cb5ba7f1406a58f5172d66f424151cbf3b2cc3785f6
-
SSDEEP
12288:iMr8y90J68qFj7w3WXD74dnZSAzu9U3QNCZdSo7AJkFfMVF/X2:qytzj7HXf4dnZSAzQmdSo9oF/2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-