General
-
Target
462c31c9c1423cb53e2374b013b138c46110dfe1644a78c68e12fe635be04b8f
-
Size
684KB
-
Sample
230326-znsffsaa43
-
MD5
76593e35e55488a6a169723e6b6a29d9
-
SHA1
fc1edb36a45c978f017cf50960b90e7242e7d01f
-
SHA256
462c31c9c1423cb53e2374b013b138c46110dfe1644a78c68e12fe635be04b8f
-
SHA512
0c34e5d24214546dd9a0687411b91990e2aedd7215ce1d31a2e408e4b11e426c474360436af181888bcf8b0b931fb1b7e2dcca68728e1451db6dbfc51c80e608
-
SSDEEP
12288:kMrmy90Fh5V6UxU3RMgOsm3kjB7pZSO5XGRAG:iymb/q3RMgOsm3itj9kAG
Static task
static1
Behavioral task
behavioral1
Sample
462c31c9c1423cb53e2374b013b138c46110dfe1644a78c68e12fe635be04b8f.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Targets
-
-
Target
462c31c9c1423cb53e2374b013b138c46110dfe1644a78c68e12fe635be04b8f
-
Size
684KB
-
MD5
76593e35e55488a6a169723e6b6a29d9
-
SHA1
fc1edb36a45c978f017cf50960b90e7242e7d01f
-
SHA256
462c31c9c1423cb53e2374b013b138c46110dfe1644a78c68e12fe635be04b8f
-
SHA512
0c34e5d24214546dd9a0687411b91990e2aedd7215ce1d31a2e408e4b11e426c474360436af181888bcf8b0b931fb1b7e2dcca68728e1451db6dbfc51c80e608
-
SSDEEP
12288:kMrmy90Fh5V6UxU3RMgOsm3kjB7pZSO5XGRAG:iymb/q3RMgOsm3itj9kAG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-