General
-
Target
fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89
-
Size
685KB
-
Sample
230327-r36mmaga3x
-
MD5
06d3169043f2d148447213dadaa64f21
-
SHA1
87c46249990a22c25a2087489071929209c38cd4
-
SHA256
fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89
-
SHA512
b9067343cba67c24ad160179627b016c924c24b2e525fadfa6f0861eeba5b90b763f76bd862e9bc587ca327fd7cafe8bd8671107b4a13a3dbbf72a739d16fbf0
-
SSDEEP
12288:6Mrky90Xt2k07ePJ6PJFO+FRuYqPzTHV4d76Ez2CYBHx4EED44zUgoy:yyitNmflqPzTed76Ez4lx4EEDbggF
Static task
static1
Behavioral task
behavioral1
Sample
fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89
-
Size
685KB
-
MD5
06d3169043f2d148447213dadaa64f21
-
SHA1
87c46249990a22c25a2087489071929209c38cd4
-
SHA256
fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89
-
SHA512
b9067343cba67c24ad160179627b016c924c24b2e525fadfa6f0861eeba5b90b763f76bd862e9bc587ca327fd7cafe8bd8671107b4a13a3dbbf72a739d16fbf0
-
SSDEEP
12288:6Mrky90Xt2k07ePJ6PJFO+FRuYqPzTHV4d76Ez2CYBHx4EED44zUgoy:yyitNmflqPzTed76Ez4lx4EEDbggF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-