General
-
Target
768cee60f8c24eb15ddf59e1b8c24eb6d744d57ff26d6a5724c96208bd98d131
-
Size
683KB
-
Sample
230324-qvnw6sef74
-
MD5
3b1e3bbdae46e064f39556a26c436808
-
SHA1
e68ff4794ec718f004b9f442fac2e58cc6e30b07
-
SHA256
768cee60f8c24eb15ddf59e1b8c24eb6d744d57ff26d6a5724c96208bd98d131
-
SHA512
985ff027b99a09112b7c53688c580a6c866ba89b24d0e9d4b7b3fb6d27f3494997915288e15c1948dbd04c73b04afc7614dc2a1ecf594de45b176002120def09
-
SSDEEP
12288:4a1/Bcuj0BmeF0ro69uQ1An3M65EUwd9pnAYFbHTtn6XtJSYr317NkExf:4anIEBrh9uQ1Ycp7pFbHymkJNp
Static task
static1
Behavioral task
behavioral1
Sample
768cee60f8c24eb15ddf59e1b8c24eb6d744d57ff26d6a5724c96208bd98d131.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
768cee60f8c24eb15ddf59e1b8c24eb6d744d57ff26d6a5724c96208bd98d131
-
Size
683KB
-
MD5
3b1e3bbdae46e064f39556a26c436808
-
SHA1
e68ff4794ec718f004b9f442fac2e58cc6e30b07
-
SHA256
768cee60f8c24eb15ddf59e1b8c24eb6d744d57ff26d6a5724c96208bd98d131
-
SHA512
985ff027b99a09112b7c53688c580a6c866ba89b24d0e9d4b7b3fb6d27f3494997915288e15c1948dbd04c73b04afc7614dc2a1ecf594de45b176002120def09
-
SSDEEP
12288:4a1/Bcuj0BmeF0ro69uQ1An3M65EUwd9pnAYFbHTtn6XtJSYr317NkExf:4anIEBrh9uQ1Ycp7pFbHymkJNp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-