General
-
Target
47b1ef99d4c91e21c63ef0f0611b316afc04bc04bc1d74bccdc13bf40de20ea0
-
Size
552KB
-
Sample
230325-qwnykach43
-
MD5
169ea684d07bf3b854c844a8587295d4
-
SHA1
ae2fa5c1914047510e694881c1ce38315e88314d
-
SHA256
47b1ef99d4c91e21c63ef0f0611b316afc04bc04bc1d74bccdc13bf40de20ea0
-
SHA512
b9f638bc96749f64f4670219b18b63245f8e54b70486da58c3497260a52c93c2af3bae614250e74ec4f9a5e827b420a8dabaead32fa729b66bd311ff74b37778
-
SSDEEP
12288:0Mrhy90/SgW4HT21F+r+4Ul/G4QbvILm2d0MCdHdkVdoeicRXB11RDf0fJG:lyNAT2nlVQjMmr/dkVieicRXXDfAG
Static task
static1
Behavioral task
behavioral1
Sample
47b1ef99d4c91e21c63ef0f0611b316afc04bc04bc1d74bccdc13bf40de20ea0.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
rotik
193.233.20.32:4125
-
auth_value
74863478ae154e921eb729354d2bb4bd
Targets
-
-
Target
47b1ef99d4c91e21c63ef0f0611b316afc04bc04bc1d74bccdc13bf40de20ea0
-
Size
552KB
-
MD5
169ea684d07bf3b854c844a8587295d4
-
SHA1
ae2fa5c1914047510e694881c1ce38315e88314d
-
SHA256
47b1ef99d4c91e21c63ef0f0611b316afc04bc04bc1d74bccdc13bf40de20ea0
-
SHA512
b9f638bc96749f64f4670219b18b63245f8e54b70486da58c3497260a52c93c2af3bae614250e74ec4f9a5e827b420a8dabaead32fa729b66bd311ff74b37778
-
SSDEEP
12288:0Mrhy90/SgW4HT21F+r+4Ul/G4QbvILm2d0MCdHdkVdoeicRXB11RDf0fJG:lyNAT2nlVQjMmr/dkVieicRXXDfAG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-