General
-
Target
cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd
-
Size
685KB
-
Sample
230327-q5efgsfg7z
-
MD5
0c4bf728035c00a762008b153586681a
-
SHA1
093e863c446f4ee217ceeb9599ba5f87cd6e2b00
-
SHA256
cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd
-
SHA512
e7580cab46c92a406fe095d4f69f226e7a868c6ffe2342609f42307ad36ad42fa36db78137ed58c18ecdbd214c08b44d3bf474585e4e47e830ecfc39af27ef9f
-
SSDEEP
12288:nMrGy90majJWUsYa48ulwEFs3YCGiXsSBH1zTHVhgsnnRpAKBz8gEiUuP5zb9g:dyUo//4FaEOtL/VzTvgsnnRjp8gE1uxO
Static task
static1
Behavioral task
behavioral1
Sample
cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd
-
Size
685KB
-
MD5
0c4bf728035c00a762008b153586681a
-
SHA1
093e863c446f4ee217ceeb9599ba5f87cd6e2b00
-
SHA256
cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd
-
SHA512
e7580cab46c92a406fe095d4f69f226e7a868c6ffe2342609f42307ad36ad42fa36db78137ed58c18ecdbd214c08b44d3bf474585e4e47e830ecfc39af27ef9f
-
SSDEEP
12288:nMrGy90majJWUsYa48ulwEFs3YCGiXsSBH1zTHVhgsnnRpAKBz8gEiUuP5zb9g:dyUo//4FaEOtL/VzTvgsnnRjp8gE1uxO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-