General
-
Target
b019b4f06213fc80bc2e843040bd56a5611023367c79ccb1abda3ecf84cb242b
-
Size
687KB
-
Sample
230325-tw7x8ade33
-
MD5
c160927427015bd37adcd8494993ceb6
-
SHA1
9d04a76ab64ae137b0914e8ae8d6341b897f76c2
-
SHA256
b019b4f06213fc80bc2e843040bd56a5611023367c79ccb1abda3ecf84cb242b
-
SHA512
9c03a5fd3678d345d01550e7daea001c64e0976da56acffb85268c3349f1e42a40ea0cfe2a49857ea4c11d7d835b68fa1e72519d129eee165534170c603edad0
-
SSDEEP
12288:fMrcy90knz/jCdq+AFHtyn553TjqWUrLvvatDNPHnVYe9PQ:Py9zLCdhmynz/q7XKvnVY4PQ
Static task
static1
Behavioral task
behavioral1
Sample
b019b4f06213fc80bc2e843040bd56a5611023367c79ccb1abda3ecf84cb242b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
viza
193.233.20.32:4125
-
auth_value
153a106a89fae7251f2dc17be2eb5720
Targets
-
-
Target
b019b4f06213fc80bc2e843040bd56a5611023367c79ccb1abda3ecf84cb242b
-
Size
687KB
-
MD5
c160927427015bd37adcd8494993ceb6
-
SHA1
9d04a76ab64ae137b0914e8ae8d6341b897f76c2
-
SHA256
b019b4f06213fc80bc2e843040bd56a5611023367c79ccb1abda3ecf84cb242b
-
SHA512
9c03a5fd3678d345d01550e7daea001c64e0976da56acffb85268c3349f1e42a40ea0cfe2a49857ea4c11d7d835b68fa1e72519d129eee165534170c603edad0
-
SSDEEP
12288:fMrcy90knz/jCdq+AFHtyn553TjqWUrLvvatDNPHnVYe9PQ:Py9zLCdhmynz/q7XKvnVY4PQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-