General
-
Target
bbb56c008a5fdc03df7c95f59bbd616786a2ef8847d32db0b541d70438224e5d
-
Size
727KB
-
Sample
230325-fmadpsbc54
-
MD5
6b5644ad69893cc954470e0bfc0c428f
-
SHA1
5f4bd14dc156dbe232cb26ebf0b1f0a9a9023c4d
-
SHA256
bbb56c008a5fdc03df7c95f59bbd616786a2ef8847d32db0b541d70438224e5d
-
SHA512
11fd0962ea6cd8f642b27e4ce258456ceb59a66df92b3843954a29769a50dbbe2099b02178ee48cff86055fc66680a283595bd9ba78407a798030f0f87a9151d
-
SSDEEP
12288:RUncFmjm+9WPtD3BDyTNqHJ1zWPQU7ICRsUb5bmybnJ9kK2vxR:Rqjj4BuRy1WYCRsUb57i
Static task
static1
Behavioral task
behavioral1
Sample
bbb56c008a5fdc03df7c95f59bbd616786a2ef8847d32db0b541d70438224e5d.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
firmu
193.233.20.32:4125
-
auth_value
9f3e5e35e4a3a38fc36c5a851728aa33
Targets
-
-
Target
bbb56c008a5fdc03df7c95f59bbd616786a2ef8847d32db0b541d70438224e5d
-
Size
727KB
-
MD5
6b5644ad69893cc954470e0bfc0c428f
-
SHA1
5f4bd14dc156dbe232cb26ebf0b1f0a9a9023c4d
-
SHA256
bbb56c008a5fdc03df7c95f59bbd616786a2ef8847d32db0b541d70438224e5d
-
SHA512
11fd0962ea6cd8f642b27e4ce258456ceb59a66df92b3843954a29769a50dbbe2099b02178ee48cff86055fc66680a283595bd9ba78407a798030f0f87a9151d
-
SSDEEP
12288:RUncFmjm+9WPtD3BDyTNqHJ1zWPQU7ICRsUb5bmybnJ9kK2vxR:Rqjj4BuRy1WYCRsUb57i
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-