General
-
Target
d1f7b43fd6e3c2e984e7eb1755e2ecf65c1dad7ee1912c8d995d05aba37cc3f5
-
Size
685KB
-
Sample
230327-jpw72acd44
-
MD5
a56c01b5927e96f9497ac7fe839705cd
-
SHA1
b97ff6038f3ede6231908b55559c8263a9c7a308
-
SHA256
d1f7b43fd6e3c2e984e7eb1755e2ecf65c1dad7ee1912c8d995d05aba37cc3f5
-
SHA512
085fe10d0cefff2e19c5234f8ae1f873d7c17210c5436e66de0d3557515f94e9948118608458157d3ffa654ecf49c063012ddb2cce35e7b635d3ff9a89c6fee7
-
SSDEEP
12288:gMrwy90LNUaBdznwZkjO/HfIkRlON3OfvaHhU+43FDz0JbpP/kyD:Ay8egdFO//I8lOJOXOa+s/c1nt
Static task
static1
Behavioral task
behavioral1
Sample
d1f7b43fd6e3c2e984e7eb1755e2ecf65c1dad7ee1912c8d995d05aba37cc3f5.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Targets
-
-
Target
d1f7b43fd6e3c2e984e7eb1755e2ecf65c1dad7ee1912c8d995d05aba37cc3f5
-
Size
685KB
-
MD5
a56c01b5927e96f9497ac7fe839705cd
-
SHA1
b97ff6038f3ede6231908b55559c8263a9c7a308
-
SHA256
d1f7b43fd6e3c2e984e7eb1755e2ecf65c1dad7ee1912c8d995d05aba37cc3f5
-
SHA512
085fe10d0cefff2e19c5234f8ae1f873d7c17210c5436e66de0d3557515f94e9948118608458157d3ffa654ecf49c063012ddb2cce35e7b635d3ff9a89c6fee7
-
SSDEEP
12288:gMrwy90LNUaBdznwZkjO/HfIkRlON3OfvaHhU+43FDz0JbpP/kyD:Ay8egdFO//I8lOJOXOa+s/c1nt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-