General
-
Target
b835e741e913e247fc776cfcb36c4e6a926254a9644523d2d38cf65613d27230
-
Size
686KB
-
Sample
230325-wpp5yadh23
-
MD5
515203d9f0680cbcb2b7800effa8b961
-
SHA1
5f8d85580b7406a73402002288985e1f1a0f80d0
-
SHA256
b835e741e913e247fc776cfcb36c4e6a926254a9644523d2d38cf65613d27230
-
SHA512
1df8569b42e4f50af43f7ef499b2320b289c986982b15d5ba7e56452cdc292447a4fcef895dec6ca388165c245dee3d3916c306b402b14ccd01ebbda7f6cb2e8
-
SSDEEP
12288:SMr+y902geV4FUj5CEMNdadgd2qkKy8Db2zDpbs5vZXSku:YyjgeGFFNdad62rHeb2fpGhm
Static task
static1
Behavioral task
behavioral1
Sample
b835e741e913e247fc776cfcb36c4e6a926254a9644523d2d38cf65613d27230.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Targets
-
-
Target
b835e741e913e247fc776cfcb36c4e6a926254a9644523d2d38cf65613d27230
-
Size
686KB
-
MD5
515203d9f0680cbcb2b7800effa8b961
-
SHA1
5f8d85580b7406a73402002288985e1f1a0f80d0
-
SHA256
b835e741e913e247fc776cfcb36c4e6a926254a9644523d2d38cf65613d27230
-
SHA512
1df8569b42e4f50af43f7ef499b2320b289c986982b15d5ba7e56452cdc292447a4fcef895dec6ca388165c245dee3d3916c306b402b14ccd01ebbda7f6cb2e8
-
SSDEEP
12288:SMr+y902geV4FUj5CEMNdadgd2qkKy8Db2zDpbs5vZXSku:YyjgeGFFNdad62rHeb2fpGhm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-