General
-
Target
62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454
-
Size
687KB
-
Sample
230327-p1sxmsfe6z
-
MD5
404b9ffe611f62d0fd6edc21c160d824
-
SHA1
f4d9f1a9a89fca3b1e7429f9658ed5b401217b93
-
SHA256
62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454
-
SHA512
c5f99997566f34044a997c269665bd46ade13da21f615b42173205cca66184740c6e0a5c62f504706a61999f19d620e61f4f2b59ac344fa4b3bea86ea9ccf9eb
-
SSDEEP
12288:5MrGy90nJ5ZaP520Up5AaDCz5AigKrGQhOZOmEM9NtO2:fylKp5NQnrGQA902
Static task
static1
Behavioral task
behavioral1
Sample
62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454
-
Size
687KB
-
MD5
404b9ffe611f62d0fd6edc21c160d824
-
SHA1
f4d9f1a9a89fca3b1e7429f9658ed5b401217b93
-
SHA256
62360aa383770da31202119493b1ffb3e2967834336525430c25aaa5b3fca454
-
SHA512
c5f99997566f34044a997c269665bd46ade13da21f615b42173205cca66184740c6e0a5c62f504706a61999f19d620e61f4f2b59ac344fa4b3bea86ea9ccf9eb
-
SSDEEP
12288:5MrGy90nJ5ZaP520Up5AaDCz5AigKrGQhOZOmEM9NtO2:fylKp5NQnrGQA902
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-