General
-
Target
de9e368125cb7b1cfe14760eefd31d0f0cce152fa651394f38feb97133cfea8a
-
Size
680KB
-
Sample
230324-pd2w2agc51
-
MD5
a40c811e3aa17d0250c94c2c19d70b2b
-
SHA1
5ba33696721957def3e9fc06fb8c2cda92465fcd
-
SHA256
de9e368125cb7b1cfe14760eefd31d0f0cce152fa651394f38feb97133cfea8a
-
SHA512
e0f23c6dfce574f9919d08fe03e561c0b1269b3524d9df63c12fdb99e0508cd56fc2104748f5edcee0ded46fc07c57a016dd4b35f8a5c31b94ef8ed24e91de78
-
SSDEEP
12288:WmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:a2HD26KieG1Xs/E6F7mJqlBCKHI
Static task
static1
Behavioral task
behavioral1
Sample
de9e368125cb7b1cfe14760eefd31d0f0cce152fa651394f38feb97133cfea8a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
de9e368125cb7b1cfe14760eefd31d0f0cce152fa651394f38feb97133cfea8a
-
Size
680KB
-
MD5
a40c811e3aa17d0250c94c2c19d70b2b
-
SHA1
5ba33696721957def3e9fc06fb8c2cda92465fcd
-
SHA256
de9e368125cb7b1cfe14760eefd31d0f0cce152fa651394f38feb97133cfea8a
-
SHA512
e0f23c6dfce574f9919d08fe03e561c0b1269b3524d9df63c12fdb99e0508cd56fc2104748f5edcee0ded46fc07c57a016dd4b35f8a5c31b94ef8ed24e91de78
-
SSDEEP
12288:WmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:a2HD26KieG1Xs/E6F7mJqlBCKHI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-