General
-
Target
070c4a492afd35f5ad9cc11b592e0ac5cff475a0ade36735eb14a3ab8bbd2071
-
Size
680KB
-
Sample
230324-pnet9aec58
-
MD5
12e358e7c8356d25aa0dfbe24d5af2e3
-
SHA1
9b4e6d3c225d18a054dc3184ca578cde2ff78a31
-
SHA256
070c4a492afd35f5ad9cc11b592e0ac5cff475a0ade36735eb14a3ab8bbd2071
-
SHA512
0250b9591d707b71e2b96e3528293f22a4edbf228737bad9c212e9c6a1f884a183eda773ddf89596f928e23ebde47db5ff68d9916821a70df9c171455f81fd69
-
SSDEEP
12288:cmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:Q2HD26KieG1Xs/E6F7mJqlBCKHI
Static task
static1
Behavioral task
behavioral1
Sample
070c4a492afd35f5ad9cc11b592e0ac5cff475a0ade36735eb14a3ab8bbd2071.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
070c4a492afd35f5ad9cc11b592e0ac5cff475a0ade36735eb14a3ab8bbd2071
-
Size
680KB
-
MD5
12e358e7c8356d25aa0dfbe24d5af2e3
-
SHA1
9b4e6d3c225d18a054dc3184ca578cde2ff78a31
-
SHA256
070c4a492afd35f5ad9cc11b592e0ac5cff475a0ade36735eb14a3ab8bbd2071
-
SHA512
0250b9591d707b71e2b96e3528293f22a4edbf228737bad9c212e9c6a1f884a183eda773ddf89596f928e23ebde47db5ff68d9916821a70df9c171455f81fd69
-
SSDEEP
12288:cmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:Q2HD26KieG1Xs/E6F7mJqlBCKHI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-