General
-
Target
e401cc4aeacddffbb312585fc2ef9d3bd27a31d0f7cc1a6da5a2b12ed75aee70
-
Size
686KB
-
Sample
230326-x85v6sbf9z
-
MD5
15f1bfdf3e2105c815aa38eb3c47cbaa
-
SHA1
90199ae9d7c46bb5752243f586624dfe3a82788e
-
SHA256
e401cc4aeacddffbb312585fc2ef9d3bd27a31d0f7cc1a6da5a2b12ed75aee70
-
SHA512
d99b3bddd0560709c5801747457115799b0a9f67026c9b1dabec133a9c0d05d595aaa239079e860e4da4aecb4cc1e6c396ffbfd5f934184f454fe0da7bbb99be
-
SSDEEP
12288:lMrOy90VWotMPLRyrCJZbjB4rDXk4ULOdakr3a8e1G/aezYunpOO:TyDWrCTjBgU/1G/awX
Static task
static1
Behavioral task
behavioral1
Sample
e401cc4aeacddffbb312585fc2ef9d3bd27a31d0f7cc1a6da5a2b12ed75aee70.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Targets
-
-
Target
e401cc4aeacddffbb312585fc2ef9d3bd27a31d0f7cc1a6da5a2b12ed75aee70
-
Size
686KB
-
MD5
15f1bfdf3e2105c815aa38eb3c47cbaa
-
SHA1
90199ae9d7c46bb5752243f586624dfe3a82788e
-
SHA256
e401cc4aeacddffbb312585fc2ef9d3bd27a31d0f7cc1a6da5a2b12ed75aee70
-
SHA512
d99b3bddd0560709c5801747457115799b0a9f67026c9b1dabec133a9c0d05d595aaa239079e860e4da4aecb4cc1e6c396ffbfd5f934184f454fe0da7bbb99be
-
SSDEEP
12288:lMrOy90VWotMPLRyrCJZbjB4rDXk4ULOdakr3a8e1G/aezYunpOO:TyDWrCTjBgU/1G/awX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-