General
-
Target
0dd2d9905a53f3db8251a2a52e562cc5.exe
-
Size
553KB
-
Sample
230325-n9qyzaeg2w
-
MD5
0dd2d9905a53f3db8251a2a52e562cc5
-
SHA1
530120b2f97754dc5967effb0845cf551171bcd5
-
SHA256
9d08f15196cc86b8bbf32d25a77809fae9f14edb05159ea5df793a859b594414
-
SHA512
b3ba7ea0ed1842f473eea2eb2fcc5c515f965e51d974da64d8166beb1239f5300edf3ab6659886dcf8b4ce6eebc8292f2c11a4f4092fd0bd26b4d34b9b22c46b
-
SSDEEP
12288:VMrFy90Qq6JAa4JR8k5iuZyKynC/mWaoR6cSi8bsv:0ytqWH6I9nC/YoRrSRbsv
Static task
static1
Behavioral task
behavioral1
Sample
0dd2d9905a53f3db8251a2a52e562cc5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0dd2d9905a53f3db8251a2a52e562cc5.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
rotik
193.233.20.32:4125
-
auth_value
74863478ae154e921eb729354d2bb4bd
Targets
-
-
Target
0dd2d9905a53f3db8251a2a52e562cc5.exe
-
Size
553KB
-
MD5
0dd2d9905a53f3db8251a2a52e562cc5
-
SHA1
530120b2f97754dc5967effb0845cf551171bcd5
-
SHA256
9d08f15196cc86b8bbf32d25a77809fae9f14edb05159ea5df793a859b594414
-
SHA512
b3ba7ea0ed1842f473eea2eb2fcc5c515f965e51d974da64d8166beb1239f5300edf3ab6659886dcf8b4ce6eebc8292f2c11a4f4092fd0bd26b4d34b9b22c46b
-
SSDEEP
12288:VMrFy90Qq6JAa4JR8k5iuZyKynC/mWaoR6cSi8bsv:0ytqWH6I9nC/YoRrSRbsv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-