General
-
Target
5b20f82fac5e2899fb21fa5a25557ce1ba646aa4ec8259ba3d6116c31b3777fc
-
Size
726KB
-
Sample
230325-ewffmsba99
-
MD5
8f3fb5f59db469a92f191626d36d0090
-
SHA1
6df2a3fcc5a51327690772f3bc3b358f4fda168e
-
SHA256
5b20f82fac5e2899fb21fa5a25557ce1ba646aa4ec8259ba3d6116c31b3777fc
-
SHA512
6d38ef6cd7866cc14e58243fb7ac9c511b14ac7eea249dbf2dd7c4ef0b469b2e1d80f5ce050ad1dc98d684d58c237d902e3b226dae3399bf90295eb8a1d09ea7
-
SSDEEP
12288:np3JDQAu5fdU6AdozuoTnsSu07dIIaYwKFd9iGWOCKjEWf8XgtpsDUdIQEm7ZxS:np5u1G6AWK/C7dnap89b98Xmm/m72
Static task
static1
Behavioral task
behavioral1
Sample
5b20f82fac5e2899fb21fa5a25557ce1ba646aa4ec8259ba3d6116c31b3777fc.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
firmu
193.233.20.32:4125
-
auth_value
9f3e5e35e4a3a38fc36c5a851728aa33
Targets
-
-
Target
5b20f82fac5e2899fb21fa5a25557ce1ba646aa4ec8259ba3d6116c31b3777fc
-
Size
726KB
-
MD5
8f3fb5f59db469a92f191626d36d0090
-
SHA1
6df2a3fcc5a51327690772f3bc3b358f4fda168e
-
SHA256
5b20f82fac5e2899fb21fa5a25557ce1ba646aa4ec8259ba3d6116c31b3777fc
-
SHA512
6d38ef6cd7866cc14e58243fb7ac9c511b14ac7eea249dbf2dd7c4ef0b469b2e1d80f5ce050ad1dc98d684d58c237d902e3b226dae3399bf90295eb8a1d09ea7
-
SSDEEP
12288:np3JDQAu5fdU6AdozuoTnsSu07dIIaYwKFd9iGWOCKjEWf8XgtpsDUdIQEm7ZxS:np5u1G6AWK/C7dnap89b98Xmm/m72
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-