General
-
Target
6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283
-
Size
684KB
-
Sample
230327-q2rawadf92
-
MD5
e7092d8e4d0e976936074e7a2995766d
-
SHA1
03497f18f80820a99bf81dd7f4d9a96d913b9508
-
SHA256
6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283
-
SHA512
f2b17be85b1812b8e8e8396f5abd1f290657dda1479966e957a49861a3eb14e5fea7a58739838d993d32b226dce6763c90d8aec323896941d666ba212805f041
-
SSDEEP
12288:9MrQy90ism8iTGSTvJkk/MdL3vXnkFLqqu3x9EN3WBsjqEA6g2y5+Jzw/EW:9ykDuvm3PkFLC3x9EsGjqE3y2kEW
Static task
static1
Behavioral task
behavioral1
Sample
6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283
-
Size
684KB
-
MD5
e7092d8e4d0e976936074e7a2995766d
-
SHA1
03497f18f80820a99bf81dd7f4d9a96d913b9508
-
SHA256
6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283
-
SHA512
f2b17be85b1812b8e8e8396f5abd1f290657dda1479966e957a49861a3eb14e5fea7a58739838d993d32b226dce6763c90d8aec323896941d666ba212805f041
-
SSDEEP
12288:9MrQy90ism8iTGSTvJkk/MdL3vXnkFLqqu3x9EN3WBsjqEA6g2y5+Jzw/EW:9ykDuvm3PkFLC3x9EsGjqE3y2kEW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-