General
-
Target
9dfc852aa6e71c865d68c253c9f80528727831293e1cfcf62cf875a5b51f7f88
-
Size
680KB
-
Sample
230324-plkmqagd3s
-
MD5
a347bfef74ab1372dd63f59ec89ef3e4
-
SHA1
063609f0d5968185fe5d2e8f88099b5b43d10cef
-
SHA256
9dfc852aa6e71c865d68c253c9f80528727831293e1cfcf62cf875a5b51f7f88
-
SHA512
fe4fab9df504efd4a6ca28b4a7d3ebef879acb5bb60e16276f7ad4f6573f4fafba875e16bae2f08e4e8284318b87480d5d32d9afa727726027436ec4833fa28c
-
SSDEEP
12288:XmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:b2HD26KieG1Xs/E6F7mJqlBCKHI
Static task
static1
Behavioral task
behavioral1
Sample
9dfc852aa6e71c865d68c253c9f80528727831293e1cfcf62cf875a5b51f7f88.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
9dfc852aa6e71c865d68c253c9f80528727831293e1cfcf62cf875a5b51f7f88
-
Size
680KB
-
MD5
a347bfef74ab1372dd63f59ec89ef3e4
-
SHA1
063609f0d5968185fe5d2e8f88099b5b43d10cef
-
SHA256
9dfc852aa6e71c865d68c253c9f80528727831293e1cfcf62cf875a5b51f7f88
-
SHA512
fe4fab9df504efd4a6ca28b4a7d3ebef879acb5bb60e16276f7ad4f6573f4fafba875e16bae2f08e4e8284318b87480d5d32d9afa727726027436ec4833fa28c
-
SSDEEP
12288:XmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:b2HD26KieG1Xs/E6F7mJqlBCKHI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-