General
-
Target
36c451c54716838e3f88c0ed4454d819fe007a66a8171fd98e161a4798777bd1
-
Size
683KB
-
Sample
230324-qwdslagg31
-
MD5
ef12b8ca7fdd9faef5c532ff1cfc3406
-
SHA1
4f29c3c2dbe8e0ec7ef9b87f219d445f31265d44
-
SHA256
36c451c54716838e3f88c0ed4454d819fe007a66a8171fd98e161a4798777bd1
-
SHA512
74ed29d58805f386813596eb422565430184f0c784b938a50522a069bbfedcc7e1143966e21db1b1532084f5f3b246a79f8a766228bcd88d36ed1139a6da2101
-
SSDEEP
12288:ea1/Bcuj0BmeF0ro69uQ1An3M65EUwd9pnAYFbHTtn6XtJSYr317NkExf:eanIEBrh9uQ1Ycp7pFbHymkJNp
Static task
static1
Behavioral task
behavioral1
Sample
36c451c54716838e3f88c0ed4454d819fe007a66a8171fd98e161a4798777bd1.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Targets
-
-
Target
36c451c54716838e3f88c0ed4454d819fe007a66a8171fd98e161a4798777bd1
-
Size
683KB
-
MD5
ef12b8ca7fdd9faef5c532ff1cfc3406
-
SHA1
4f29c3c2dbe8e0ec7ef9b87f219d445f31265d44
-
SHA256
36c451c54716838e3f88c0ed4454d819fe007a66a8171fd98e161a4798777bd1
-
SHA512
74ed29d58805f386813596eb422565430184f0c784b938a50522a069bbfedcc7e1143966e21db1b1532084f5f3b246a79f8a766228bcd88d36ed1139a6da2101
-
SSDEEP
12288:ea1/Bcuj0BmeF0ro69uQ1An3M65EUwd9pnAYFbHTtn6XtJSYr317NkExf:eanIEBrh9uQ1Ycp7pFbHymkJNp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-