General
-
Target
ca796b02c7ef0f510e74ef5674eb63d86d9aba85d43f6b828c9902406a51dcb7
-
Size
682KB
-
Sample
230326-1g3taaab39
-
MD5
a0ac65cf18729003be10030e3e9ebfa2
-
SHA1
c1b2622f383005175c5e6c2554fa5c4a3a2f79ac
-
SHA256
ca796b02c7ef0f510e74ef5674eb63d86d9aba85d43f6b828c9902406a51dcb7
-
SHA512
3246816e9c8026eccd94a97336affff973e386511a27c0be3dc13097b17324d78e75e6edbdd6c0d1eb83fecab3b6d1809218519b25d6080ffb17c880d1838231
-
SSDEEP
12288:uMrDy90hp1ouFpvExCJQvnLqn6JWQJ2xk3BNZq9N1wdOQx530hKqaKwUK4GnE:hyodwCJQvnL5TJ2xeuP1sTx530hKqaKD
Static task
static1
Behavioral task
behavioral1
Sample
ca796b02c7ef0f510e74ef5674eb63d86d9aba85d43f6b828c9902406a51dcb7.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Targets
-
-
Target
ca796b02c7ef0f510e74ef5674eb63d86d9aba85d43f6b828c9902406a51dcb7
-
Size
682KB
-
MD5
a0ac65cf18729003be10030e3e9ebfa2
-
SHA1
c1b2622f383005175c5e6c2554fa5c4a3a2f79ac
-
SHA256
ca796b02c7ef0f510e74ef5674eb63d86d9aba85d43f6b828c9902406a51dcb7
-
SHA512
3246816e9c8026eccd94a97336affff973e386511a27c0be3dc13097b17324d78e75e6edbdd6c0d1eb83fecab3b6d1809218519b25d6080ffb17c880d1838231
-
SSDEEP
12288:uMrDy90hp1ouFpvExCJQvnLqn6JWQJ2xk3BNZq9N1wdOQx530hKqaKwUK4GnE:hyodwCJQvnL5TJ2xeuP1sTx530hKqaKD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-