General
-
Target
e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050
-
Size
700KB
-
Sample
230327-s2mzkagb8s
-
MD5
f1c16aa5c55ec117d98707f82e6b7e4a
-
SHA1
db3fde46739a664ad211c7f484f9ef61d970dbd4
-
SHA256
e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050
-
SHA512
28626164ed74ef2e7bff04b3064e464172913b66218c8411bc531453e649b808c1e182f8a4a219df9a4e75713d988bfd53e17dc631bcc5ff0b52d8b42cc59276
-
SSDEEP
12288:MMrWy90AEFAka7oxJgOC9EOFYj+cm+4LBRvrllO5kLWScaoh:6yzEMozg79zWj+cB4LVlO5kLWJaC
Static task
static1
Behavioral task
behavioral1
Sample
e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050
-
Size
700KB
-
MD5
f1c16aa5c55ec117d98707f82e6b7e4a
-
SHA1
db3fde46739a664ad211c7f484f9ef61d970dbd4
-
SHA256
e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050
-
SHA512
28626164ed74ef2e7bff04b3064e464172913b66218c8411bc531453e649b808c1e182f8a4a219df9a4e75713d988bfd53e17dc631bcc5ff0b52d8b42cc59276
-
SSDEEP
12288:MMrWy90AEFAka7oxJgOC9EOFYj+cm+4LBRvrllO5kLWScaoh:6yzEMozg79zWj+cB4LVlO5kLWJaC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-