General
-
Target
08e75e6fcaeb0b5cdbd6c05166ed315b7bd0e6a39f7ae113a9c8e75610b2df93
-
Size
680KB
-
Sample
230327-r3y8jsdh67
-
MD5
854e4fd7f7559937a031ad0264fd4f11
-
SHA1
d0ab8921cd06524ca570f07b3c431f9cd8f76af9
-
SHA256
08e75e6fcaeb0b5cdbd6c05166ed315b7bd0e6a39f7ae113a9c8e75610b2df93
-
SHA512
0237c9b58f98300267a06f75722d3a297d7430005bd32a89cd268326fa2181b52c42929bb1299ab599e0495d745cbd874a8661b310f81ccb3c24de0919e82a7b
-
SSDEEP
12288:I6gKv6OXMd+PoUzOyWIuQ9QkYro8uiQhAfwpCQvoWevi7XxCkI0uob/:v5VX3PnrKkYPuphAYsQ1t7XxtIw/
Static task
static1
Behavioral task
behavioral1
Sample
08e75e6fcaeb0b5cdbd6c05166ed315b7bd0e6a39f7ae113a9c8e75610b2df93.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
08e75e6fcaeb0b5cdbd6c05166ed315b7bd0e6a39f7ae113a9c8e75610b2df93
-
Size
680KB
-
MD5
854e4fd7f7559937a031ad0264fd4f11
-
SHA1
d0ab8921cd06524ca570f07b3c431f9cd8f76af9
-
SHA256
08e75e6fcaeb0b5cdbd6c05166ed315b7bd0e6a39f7ae113a9c8e75610b2df93
-
SHA512
0237c9b58f98300267a06f75722d3a297d7430005bd32a89cd268326fa2181b52c42929bb1299ab599e0495d745cbd874a8661b310f81ccb3c24de0919e82a7b
-
SSDEEP
12288:I6gKv6OXMd+PoUzOyWIuQ9QkYro8uiQhAfwpCQvoWevi7XxCkI0uob/:v5VX3PnrKkYPuphAYsQ1t7XxtIw/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-