General
-
Target
fa60c6f2a07b2ec542770d2c28818d7d6c10e1b43c625ebe0888aa6c77ceaeee
-
Size
721KB
-
Sample
230326-gqlftaff75
-
MD5
60826fb6eb71ad98478966e3b9d6ba93
-
SHA1
dcdc824552cf6b60629c151320fa6eea7e6190b6
-
SHA256
fa60c6f2a07b2ec542770d2c28818d7d6c10e1b43c625ebe0888aa6c77ceaeee
-
SHA512
b8cfc269f76131116739d3eaa76c9f05791351076f59e36fc886bf3f2ae82ef63e065f7afb350b607fb476170c27114052a9ea44b6d860e344c07fe024db032b
-
SSDEEP
12288:VE3ieHoOpxJokeOBsPjWw+1CJBEWQuaG6vRIo3EUz3yzXF8cs9rZu:h6oOfJomiZ+1tTfZP3EiizORrk
Static task
static1
Behavioral task
behavioral1
Sample
fa60c6f2a07b2ec542770d2c28818d7d6c10e1b43c625ebe0888aa6c77ceaeee.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
baby
193.233.20.32:4125
-
auth_value
ac57b7f238265a76162de47751c48bb7
Targets
-
-
Target
fa60c6f2a07b2ec542770d2c28818d7d6c10e1b43c625ebe0888aa6c77ceaeee
-
Size
721KB
-
MD5
60826fb6eb71ad98478966e3b9d6ba93
-
SHA1
dcdc824552cf6b60629c151320fa6eea7e6190b6
-
SHA256
fa60c6f2a07b2ec542770d2c28818d7d6c10e1b43c625ebe0888aa6c77ceaeee
-
SHA512
b8cfc269f76131116739d3eaa76c9f05791351076f59e36fc886bf3f2ae82ef63e065f7afb350b607fb476170c27114052a9ea44b6d860e344c07fe024db032b
-
SSDEEP
12288:VE3ieHoOpxJokeOBsPjWw+1CJBEWQuaG6vRIo3EUz3yzXF8cs9rZu:h6oOfJomiZ+1tTfZP3EiizORrk
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-