General
-
Target
302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329
-
Size
688KB
-
Sample
230327-pmw25sfd81
-
MD5
d192f85a46e868ddc7a01f7798eb77c3
-
SHA1
c179e853894bde484e1b58f1af817619f77abb3f
-
SHA256
302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329
-
SHA512
cd76271c6fcece6f6b7c01e7aeea9582d1cdbf89501fe1e7395f79ff7582649410a77039ffffb406f0aac4f51be46d56fa7acef088b09f6c3fd043d936c1eebd
-
SSDEEP
12288:CMriy90Nq73BU3QrQXrH7faGH1EAh0VReCGcgSSke2MZ0I6JGzaNIfwyY:Uym8cXXfPH1Es0VdXs7t+I6czsh
Static task
static1
Behavioral task
behavioral1
Sample
302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329
-
Size
688KB
-
MD5
d192f85a46e868ddc7a01f7798eb77c3
-
SHA1
c179e853894bde484e1b58f1af817619f77abb3f
-
SHA256
302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329
-
SHA512
cd76271c6fcece6f6b7c01e7aeea9582d1cdbf89501fe1e7395f79ff7582649410a77039ffffb406f0aac4f51be46d56fa7acef088b09f6c3fd043d936c1eebd
-
SSDEEP
12288:CMriy90Nq73BU3QrQXrH7faGH1EAh0VReCGcgSSke2MZ0I6JGzaNIfwyY:Uym8cXXfPH1Es0VdXs7t+I6czsh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-