General
-
Target
2bf151385d0132e91dff6764a9de98bf69b79efd1d37894c456a40f7825e6858
-
Size
712KB
-
Sample
230326-2gam6sac82
-
MD5
143f58061e22d71b018ed89c0cb4880d
-
SHA1
c5ad8deae43bdce241c1316175e3019014ab4466
-
SHA256
2bf151385d0132e91dff6764a9de98bf69b79efd1d37894c456a40f7825e6858
-
SHA512
b5f20438fe7287e77090b8bc25c5d9569b70af8cdfe836dfef8ab16988caa193e4655f83a4c1e1e928b25564297da332171b1aca385d3673230371a376ad902e
-
SSDEEP
12288:66wPvQ/TucEaw27CDzp9E+QTWQF6Cc7DUpf/rsq+BbY+GEtM:io/TuZ8C/E+QTWQgh7G+C+GEtM
Static task
static1
Behavioral task
behavioral1
Sample
2bf151385d0132e91dff6764a9de98bf69b79efd1d37894c456a40f7825e6858.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Targets
-
-
Target
2bf151385d0132e91dff6764a9de98bf69b79efd1d37894c456a40f7825e6858
-
Size
712KB
-
MD5
143f58061e22d71b018ed89c0cb4880d
-
SHA1
c5ad8deae43bdce241c1316175e3019014ab4466
-
SHA256
2bf151385d0132e91dff6764a9de98bf69b79efd1d37894c456a40f7825e6858
-
SHA512
b5f20438fe7287e77090b8bc25c5d9569b70af8cdfe836dfef8ab16988caa193e4655f83a4c1e1e928b25564297da332171b1aca385d3673230371a376ad902e
-
SSDEEP
12288:66wPvQ/TucEaw27CDzp9E+QTWQF6Cc7DUpf/rsq+BbY+GEtM:io/TuZ8C/E+QTWQgh7G+C+GEtM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-