General
-
Target
tmp
-
Size
687KB
-
Sample
230327-mphlesda68
-
MD5
11ebcc69f0bf8e065cd426aecb5d8bea
-
SHA1
f700fa1fcd61a41a2ed0d315f3511db7362c018e
-
SHA256
447c0460afe1baaa539a41194910d27edcec92b0b2d2f28b47a180d0f4ed9d39
-
SHA512
e2267a325fd8298f56131e0b66c4cd4e2142ca7db70fcf1e57a79e5e14d4f3002ee5879d8f425e5f94f468fabedd22cef02ae5e6f0b743b01dfed86155282373
-
SSDEEP
12288:yMryy901Co0dIEZlqYTbALMx502L9fFyhZ0TAcFYkw1yyD86n5sTa0D3lV:syyfwlg80Sc+TAcFYDkyD8asT/1V
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
tmp
-
Size
687KB
-
MD5
11ebcc69f0bf8e065cd426aecb5d8bea
-
SHA1
f700fa1fcd61a41a2ed0d315f3511db7362c018e
-
SHA256
447c0460afe1baaa539a41194910d27edcec92b0b2d2f28b47a180d0f4ed9d39
-
SHA512
e2267a325fd8298f56131e0b66c4cd4e2142ca7db70fcf1e57a79e5e14d4f3002ee5879d8f425e5f94f468fabedd22cef02ae5e6f0b743b01dfed86155282373
-
SSDEEP
12288:yMryy901Co0dIEZlqYTbALMx502L9fFyhZ0TAcFYkw1yyD86n5sTa0D3lV:syyfwlg80Sc+TAcFYDkyD8asT/1V
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-