General
-
Target
77558655bd894f570f958a9df8636b6e0f83468ef15814571d7cb85759bc5a11
-
Size
685KB
-
Sample
230327-qbjs4sff2t
-
MD5
207e62fda4c2b75179461d0ef15badef
-
SHA1
2f54e2dc2997a73ea23ef33b568df4cac79939c4
-
SHA256
77558655bd894f570f958a9df8636b6e0f83468ef15814571d7cb85759bc5a11
-
SHA512
682792739253f08d8ceba03ee8f9155a9d3c6a5da36ea00f7b7fced00eeda24c5b8cd0b7e66fc78dba1a2485f61800064dea5fcf18915cbd776a53f2df046158
-
SSDEEP
12288:6Mriy90hz8/u2l5MlpOTzFi6vXpneGO/TmRmRDT9K+d+lBM2aYRD:8yMyXMlGhBeGeSYR3gph5
Static task
static1
Behavioral task
behavioral1
Sample
77558655bd894f570f958a9df8636b6e0f83468ef15814571d7cb85759bc5a11.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
77558655bd894f570f958a9df8636b6e0f83468ef15814571d7cb85759bc5a11
-
Size
685KB
-
MD5
207e62fda4c2b75179461d0ef15badef
-
SHA1
2f54e2dc2997a73ea23ef33b568df4cac79939c4
-
SHA256
77558655bd894f570f958a9df8636b6e0f83468ef15814571d7cb85759bc5a11
-
SHA512
682792739253f08d8ceba03ee8f9155a9d3c6a5da36ea00f7b7fced00eeda24c5b8cd0b7e66fc78dba1a2485f61800064dea5fcf18915cbd776a53f2df046158
-
SSDEEP
12288:6Mriy90hz8/u2l5MlpOTzFi6vXpneGO/TmRmRDT9K+d+lBM2aYRD:8yMyXMlGhBeGeSYR3gph5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-