General
-
Target
2b52947e907101d5380de55afc9135603d1fe292c683d89f56f606715784844e
-
Size
685KB
-
Sample
230327-r3jg4adh66
-
MD5
3615bc16e4cbf04eff35a8930f4c412d
-
SHA1
5048b1473a47c84d6e304fc838f4abce916f21d5
-
SHA256
2b52947e907101d5380de55afc9135603d1fe292c683d89f56f606715784844e
-
SHA512
8cf8f1f02e23c45296c9866317fb1d8f7f03ec329a0273d1939ec2498a90809645aaf332a44989764139014fd86b777913cf14dd1c5841340bc924d15af331b8
-
SSDEEP
12288:PMrgy90hz5KYdr1uAU9JIkbitz/8ROZ2w4a7f4PnBLlVEGQQAuW9N:7y+TfY949Ia7f4/BlVEYC
Static task
static1
Behavioral task
behavioral1
Sample
2b52947e907101d5380de55afc9135603d1fe292c683d89f56f606715784844e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
2b52947e907101d5380de55afc9135603d1fe292c683d89f56f606715784844e
-
Size
685KB
-
MD5
3615bc16e4cbf04eff35a8930f4c412d
-
SHA1
5048b1473a47c84d6e304fc838f4abce916f21d5
-
SHA256
2b52947e907101d5380de55afc9135603d1fe292c683d89f56f606715784844e
-
SHA512
8cf8f1f02e23c45296c9866317fb1d8f7f03ec329a0273d1939ec2498a90809645aaf332a44989764139014fd86b777913cf14dd1c5841340bc924d15af331b8
-
SSDEEP
12288:PMrgy90hz5KYdr1uAU9JIkbitz/8ROZ2w4a7f4PnBLlVEGQQAuW9N:7y+TfY949Ia7f4/BlVEYC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-