General
-
Target
3e764cb5ef309cf544436188adc490d7596d242894b7606e74b47bf2cb2df1f0
-
Size
687KB
-
Sample
230325-x8ap2agb6x
-
MD5
72755b19d8b4843f9f0d6ac1b3881c2f
-
SHA1
3b5d6b9e058c3b6f8d9c8baa63fe2e4a8006e17a
-
SHA256
3e764cb5ef309cf544436188adc490d7596d242894b7606e74b47bf2cb2df1f0
-
SHA512
d4535bc63dded1f2805d83359faa2656fdb195826b2aae34ebba62b819544dbec3a8242a193e964cb6313c8e0d7a8b1aac3a43c884e151e6bad3b7dd5f1eef43
-
SSDEEP
12288:oMrHy90+7/uYScTrEtgYlP9rKepRot+TvE2gnWKVElIBMxz3k0vv:vyVTIlVjo8rEfVElPZN
Static task
static1
Behavioral task
behavioral1
Sample
3e764cb5ef309cf544436188adc490d7596d242894b7606e74b47bf2cb2df1f0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
viza
193.233.20.32:4125
-
auth_value
153a106a89fae7251f2dc17be2eb5720
Targets
-
-
Target
3e764cb5ef309cf544436188adc490d7596d242894b7606e74b47bf2cb2df1f0
-
Size
687KB
-
MD5
72755b19d8b4843f9f0d6ac1b3881c2f
-
SHA1
3b5d6b9e058c3b6f8d9c8baa63fe2e4a8006e17a
-
SHA256
3e764cb5ef309cf544436188adc490d7596d242894b7606e74b47bf2cb2df1f0
-
SHA512
d4535bc63dded1f2805d83359faa2656fdb195826b2aae34ebba62b819544dbec3a8242a193e964cb6313c8e0d7a8b1aac3a43c884e151e6bad3b7dd5f1eef43
-
SSDEEP
12288:oMrHy90+7/uYScTrEtgYlP9rKepRot+TvE2gnWKVElIBMxz3k0vv:vyVTIlVjo8rEfVElPZN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-