General
-
Target
c19fa406e66add87d49b92cda7feafa54c28a5889295ad9a773e4820ad90e81e
-
Size
686KB
-
Sample
230327-pmbffafd8z
-
MD5
833362721d39691ed5f519da58cadec1
-
SHA1
5c6d002abfc3514b681f325b4d9c6f3f11e146a5
-
SHA256
c19fa406e66add87d49b92cda7feafa54c28a5889295ad9a773e4820ad90e81e
-
SHA512
a74832d4bfe48c51ba919d8fdb72a7a1aed57de6b107adb075c204010565bf5a26d81bd85ce761cdb135bdd109b2e6ddea0d650f014fddce73c2118e25b154e3
-
SSDEEP
12288:PMrSy90fm0+ph39fJrcZWIKycFtVZ0689bqNs7VDJwu:xyB0e9hrJI7o+6eqK7VDJ3
Static task
static1
Behavioral task
behavioral1
Sample
c19fa406e66add87d49b92cda7feafa54c28a5889295ad9a773e4820ad90e81e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
c19fa406e66add87d49b92cda7feafa54c28a5889295ad9a773e4820ad90e81e
-
Size
686KB
-
MD5
833362721d39691ed5f519da58cadec1
-
SHA1
5c6d002abfc3514b681f325b4d9c6f3f11e146a5
-
SHA256
c19fa406e66add87d49b92cda7feafa54c28a5889295ad9a773e4820ad90e81e
-
SHA512
a74832d4bfe48c51ba919d8fdb72a7a1aed57de6b107adb075c204010565bf5a26d81bd85ce761cdb135bdd109b2e6ddea0d650f014fddce73c2118e25b154e3
-
SSDEEP
12288:PMrSy90fm0+ph39fJrcZWIKycFtVZ0689bqNs7VDJwu:xyB0e9hrJI7o+6eqK7VDJ3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-