General
-
Target
cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d
-
Size
701KB
-
Sample
230327-tdlbhagc4t
-
MD5
8737604f6d39831dc15e9299117f1974
-
SHA1
e648205a9628330276c73464f2e6bc4f1299aa39
-
SHA256
cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d
-
SHA512
064808ba56edf31df1cb05b00ebeb771b7e8ae2eaf5ea6e85f5ae0a4475c8466d76cde32c86e87b43b86d70db2f7d020c432031b3aa049209d7d4da7d673a0d3
-
SSDEEP
12288:BMrty90/12LdSoi4YMu/jpZ0zm570k7MABRvJcXRmVL2iVW:kyM12JBXy/jbY8MA96gVC
Static task
static1
Behavioral task
behavioral1
Sample
cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d
-
Size
701KB
-
MD5
8737604f6d39831dc15e9299117f1974
-
SHA1
e648205a9628330276c73464f2e6bc4f1299aa39
-
SHA256
cbff684f632257b2769568a234b70443cbf6bb62cb56dce3a5e60c7a3629295d
-
SHA512
064808ba56edf31df1cb05b00ebeb771b7e8ae2eaf5ea6e85f5ae0a4475c8466d76cde32c86e87b43b86d70db2f7d020c432031b3aa049209d7d4da7d673a0d3
-
SSDEEP
12288:BMrty90/12LdSoi4YMu/jpZ0zm570k7MABRvJcXRmVL2iVW:kyM12JBXy/jbY8MA96gVC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-