General
-
Target
ddda4afb882aa2aba9f55a8afb127ad951c748ba2d8364f98658459f0ab4036d
-
Size
680KB
-
Sample
230324-qs211sef56
-
MD5
d874d14fb03e0efa2df2aa72cacdee37
-
SHA1
e438f211fa33c26659c715caddb994b7edda85c9
-
SHA256
ddda4afb882aa2aba9f55a8afb127ad951c748ba2d8364f98658459f0ab4036d
-
SHA512
61b5ceb05d8aa08e628718ed24cb0e7296c43abab0afe7e07c9fcf06377928b79488e149152750874de0aa41768f4a65f8cabafb7fa105c841e40fcd55079677
-
SSDEEP
12288:vWhiwvydhO5fi82I8vkYVOIWEUSu+/iibwji4JLM+nOmr4A1fCXDR76:vWQdhO5fp2I8kUOZm/jbKi4i+XRhCTE
Static task
static1
Behavioral task
behavioral1
Sample
ddda4afb882aa2aba9f55a8afb127ad951c748ba2d8364f98658459f0ab4036d.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
ddda4afb882aa2aba9f55a8afb127ad951c748ba2d8364f98658459f0ab4036d
-
Size
680KB
-
MD5
d874d14fb03e0efa2df2aa72cacdee37
-
SHA1
e438f211fa33c26659c715caddb994b7edda85c9
-
SHA256
ddda4afb882aa2aba9f55a8afb127ad951c748ba2d8364f98658459f0ab4036d
-
SHA512
61b5ceb05d8aa08e628718ed24cb0e7296c43abab0afe7e07c9fcf06377928b79488e149152750874de0aa41768f4a65f8cabafb7fa105c841e40fcd55079677
-
SSDEEP
12288:vWhiwvydhO5fi82I8vkYVOIWEUSu+/iibwji4JLM+nOmr4A1fCXDR76:vWQdhO5fp2I8kUOZm/jbKi4i+XRhCTE
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-