General
-
Target
df8ee0fe60f0e72074fdf09e64bb17af.bin
-
Size
603KB
-
Sample
230326-chhbzafb82
-
MD5
abbeda4bd4b25e5c5b07a946e40feb8e
-
SHA1
05c4dbdeef7d1f474a6cb18136de62ae0584d9d1
-
SHA256
259cbbeb22c18fe58f552beeca89455f0421770e1ba2c9afef4e0099ee5f7fa3
-
SHA512
a612d47ea6bf09d88a04a1d87e1d06be85ee37cb0c6245251cce79a539c17faea30d50d14274a259d4b01eacdd9df27c53fb44568fd98c3d4f52a59c941b3b50
-
SSDEEP
12288:EB+1mvQUajgXa7nkHeTY9tsXslpTTuVmvec/4YuAD5YK8Z3h25K80a:EwhUcgK7jY9KXslpTy4eK3ie5
Static task
static1
Behavioral task
behavioral1
Sample
ee0c8f35ddfb625293a07937b1684a98b466882c671b7a31f507d13cc9e06719.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ee0c8f35ddfb625293a07937b1684a98b466882c671b7a31f507d13cc9e06719.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
gena
193.233.20.32:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Targets
-
-
Target
ee0c8f35ddfb625293a07937b1684a98b466882c671b7a31f507d13cc9e06719.exe
-
Size
713KB
-
MD5
df8ee0fe60f0e72074fdf09e64bb17af
-
SHA1
2c1b6a67d09e920d0d56c7ad832a4d8d6c8629b0
-
SHA256
ee0c8f35ddfb625293a07937b1684a98b466882c671b7a31f507d13cc9e06719
-
SHA512
055d20ffbeb7fc2d97f4f1e36dea568c3d17dcdba0971e39b420ecf11e983d2471e262faa3d23a9eff7991f38064760f12acf3113d1c37ddb31a05a3823b5529
-
SSDEEP
12288:3utvNcCqg/Wwnldm8skIVWfmAbUQxMYgAhRkWMstIJsWSwPSMUKuZvVX6yDQxl6V:3mLqiWwldm9XWfBzxM3Ozk5S/MuZvVXn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-