General
-
Target
637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a
-
Size
685KB
-
Sample
230327-sbzknsea24
-
MD5
915e931144085cc6ad36e7a9b57b2f6d
-
SHA1
61d03487102a42ff1e7ca20c99df427e2640cc51
-
SHA256
637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a
-
SHA512
b906c09d105d529a4118dbd2be902bc31e58266f220e65d2f63df56839cfec1ad334b45b459d013556da45a7adabc1a627ac4037158d237e0f9083b012c6f05f
-
SSDEEP
12288:dMrSy903LqlVIyIeBF3tfWxP9hw5QgvgU7BIBoEPoI2NTI5NmyF9:nym0XIeL5Wx6QGgkaBoEPKNTSJF9
Static task
static1
Behavioral task
behavioral1
Sample
637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a
-
Size
685KB
-
MD5
915e931144085cc6ad36e7a9b57b2f6d
-
SHA1
61d03487102a42ff1e7ca20c99df427e2640cc51
-
SHA256
637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a
-
SHA512
b906c09d105d529a4118dbd2be902bc31e58266f220e65d2f63df56839cfec1ad334b45b459d013556da45a7adabc1a627ac4037158d237e0f9083b012c6f05f
-
SSDEEP
12288:dMrSy903LqlVIyIeBF3tfWxP9hw5QgvgU7BIBoEPoI2NTI5NmyF9:nym0XIeL5Wx6QGgkaBoEPKNTSJF9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-