General
-
Target
a76c5b96dc760f120ca5648ff469abd2.exe
-
Size
686KB
-
Sample
230327-qv95eafg3z
-
MD5
a76c5b96dc760f120ca5648ff469abd2
-
SHA1
81242e373931fdfbcb947969d8e4bd4360654fb1
-
SHA256
f74d44fd46f445f4346eed0236faaa4b932e675b315dccffd1f4476d3559bc93
-
SHA512
6f72b077c775fc0bee9fd1b64aeb8970aa594b473a84a19e2e3bdf55b806a31a5db746b23ba30c96300919da473e6bd08e5c849bb257f90b8f4c5c90c13bb336
-
SSDEEP
12288:EMrPy90UKsnoVh888guM/AhTzPyoJ0Fukp7qHOk40a2mFG6Z0U4oX0LquNeSnDjd:7yVKbVS8RuQAhnD0Fuk5JPYe+U4TqSnF
Static task
static1
Behavioral task
behavioral1
Sample
a76c5b96dc760f120ca5648ff469abd2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a76c5b96dc760f120ca5648ff469abd2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
a76c5b96dc760f120ca5648ff469abd2.exe
-
Size
686KB
-
MD5
a76c5b96dc760f120ca5648ff469abd2
-
SHA1
81242e373931fdfbcb947969d8e4bd4360654fb1
-
SHA256
f74d44fd46f445f4346eed0236faaa4b932e675b315dccffd1f4476d3559bc93
-
SHA512
6f72b077c775fc0bee9fd1b64aeb8970aa594b473a84a19e2e3bdf55b806a31a5db746b23ba30c96300919da473e6bd08e5c849bb257f90b8f4c5c90c13bb336
-
SSDEEP
12288:EMrPy90UKsnoVh888guM/AhTzPyoJ0Fukp7qHOk40a2mFG6Z0U4oX0LquNeSnDjd:7yVKbVS8RuQAhnD0Fuk5JPYe+U4TqSnF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-