General
-
Target
4ea88e999e520561e2862609b8b71febc22a4f99c3387df430a2b32356cf1cc8
-
Size
680KB
-
Sample
230324-pz7dmsgd7v
-
MD5
757fb2aefd739b542671715e61e899d6
-
SHA1
be7accd991c9455d49f2faea4f1038b2e06fbd02
-
SHA256
4ea88e999e520561e2862609b8b71febc22a4f99c3387df430a2b32356cf1cc8
-
SHA512
1dc334b75eb719a72b4c7cc30ff2aaca5909eaeba558a1fa7a44005387ec8cb6f17d5055af628de20ea8e721ba20f34afa27ae8e06afaf1d5ca446b8e826e66a
-
SSDEEP
12288:tmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:B2HD26KieG1Xs/E6F7mJqlBCKHI
Static task
static1
Behavioral task
behavioral1
Sample
4ea88e999e520561e2862609b8b71febc22a4f99c3387df430a2b32356cf1cc8.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
4ea88e999e520561e2862609b8b71febc22a4f99c3387df430a2b32356cf1cc8
-
Size
680KB
-
MD5
757fb2aefd739b542671715e61e899d6
-
SHA1
be7accd991c9455d49f2faea4f1038b2e06fbd02
-
SHA256
4ea88e999e520561e2862609b8b71febc22a4f99c3387df430a2b32356cf1cc8
-
SHA512
1dc334b75eb719a72b4c7cc30ff2aaca5909eaeba558a1fa7a44005387ec8cb6f17d5055af628de20ea8e721ba20f34afa27ae8e06afaf1d5ca446b8e826e66a
-
SSDEEP
12288:tmMzFXFWH+sb7gsOV4Fcie32MPCXBCL2y/EArnF7mUeqlBCKVO2Ri:B2HD26KieG1Xs/E6F7mJqlBCKHI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-