General
-
Target
712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084
-
Size
685KB
-
Sample
230327-rkh4lsfh4x
-
MD5
df5ae9a6a92f280152eb2d5b2a0cd75e
-
SHA1
22b254ec41de7f9b0fe3034b6406c68a574d5c83
-
SHA256
712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084
-
SHA512
20e9813d9cb57f7f2ab353846909d6817a506ee1829f02f3aab394544c534f098b70b6bc76709b049a8b7f422276fec8c69170fd90ca6882476084b3ad54624b
-
SSDEEP
12288:3Mr0y90hzZ45rr1yMulkGgapMhWGAlVI8OIzTH/ceH4hlBZ3BE8WIPG:fyNlglkGga5dw8jzTrH4j3BE8WIu
Static task
static1
Behavioral task
behavioral1
Sample
712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084
-
Size
685KB
-
MD5
df5ae9a6a92f280152eb2d5b2a0cd75e
-
SHA1
22b254ec41de7f9b0fe3034b6406c68a574d5c83
-
SHA256
712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084
-
SHA512
20e9813d9cb57f7f2ab353846909d6817a506ee1829f02f3aab394544c534f098b70b6bc76709b049a8b7f422276fec8c69170fd90ca6882476084b3ad54624b
-
SSDEEP
12288:3Mr0y90hzZ45rr1yMulkGgapMhWGAlVI8OIzTH/ceH4hlBZ3BE8WIPG:fyNlglkGga5dw8jzTrH4j3BE8WIu
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-