General
-
Target
b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980
-
Size
685KB
-
Sample
230327-rnw5msdg86
-
MD5
aa77576942aa2ce7e15b6ea9acdabbea
-
SHA1
fae9454d59260cf08ac466cd41f312309dc6b9bf
-
SHA256
b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980
-
SHA512
9470f84ebb0f66b02792252716179254cebc20b3a6e85f3f4271978e386d634acdaa71381465ba26994ddfaca030d6f0ccf595dbbc8ce4c52b4480ece66fa1a7
-
SSDEEP
12288:EMrZy90TkaZbVdUsfbvXGEXZKHLs2PmyeWnynORwdrXe7a0B9q0EX4ah+tMRB8:Nyukgb3UsfbvPpKlPmbWnSOadrXed/qG
Static task
static1
Behavioral task
behavioral1
Sample
b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980
-
Size
685KB
-
MD5
aa77576942aa2ce7e15b6ea9acdabbea
-
SHA1
fae9454d59260cf08ac466cd41f312309dc6b9bf
-
SHA256
b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980
-
SHA512
9470f84ebb0f66b02792252716179254cebc20b3a6e85f3f4271978e386d634acdaa71381465ba26994ddfaca030d6f0ccf595dbbc8ce4c52b4480ece66fa1a7
-
SSDEEP
12288:EMrZy90TkaZbVdUsfbvXGEXZKHLs2PmyeWnynORwdrXe7a0B9q0EX4ah+tMRB8:Nyukgb3UsfbvPpKlPmbWnSOadrXed/qG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-