General
-
Target
fb054c8074dc24187d62b01f7b7bde81c0f27cc329c8c76a9dfb5852aee4937a
-
Size
700KB
-
Sample
230327-tps6gsec34
-
MD5
1ba3d0e2a8ad3d13c65cd4fb544d978d
-
SHA1
7b96b6d65f274110a4991eb4fe907a5a2a1ca884
-
SHA256
fb054c8074dc24187d62b01f7b7bde81c0f27cc329c8c76a9dfb5852aee4937a
-
SHA512
ed2001acafb6f0aedfb800407a0349842df9a8dcd7d1f969c6505fd436c6c28bc6751d4ebf1efff68a1a8338c67f20bb156e752bc02c3b65b1d30c92ca445df1
-
SSDEEP
12288:XMrqy90TIpl6r5X/SNO5yA8q7dl717OR5ZzMHXBRvollOH9/PqvFSSS:9yB45X/SmyluORjzwXWlOH9/CvFS7
Static task
static1
Behavioral task
behavioral1
Sample
fb054c8074dc24187d62b01f7b7bde81c0f27cc329c8c76a9dfb5852aee4937a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
fb054c8074dc24187d62b01f7b7bde81c0f27cc329c8c76a9dfb5852aee4937a
-
Size
700KB
-
MD5
1ba3d0e2a8ad3d13c65cd4fb544d978d
-
SHA1
7b96b6d65f274110a4991eb4fe907a5a2a1ca884
-
SHA256
fb054c8074dc24187d62b01f7b7bde81c0f27cc329c8c76a9dfb5852aee4937a
-
SHA512
ed2001acafb6f0aedfb800407a0349842df9a8dcd7d1f969c6505fd436c6c28bc6751d4ebf1efff68a1a8338c67f20bb156e752bc02c3b65b1d30c92ca445df1
-
SSDEEP
12288:XMrqy90TIpl6r5X/SNO5yA8q7dl717OR5ZzMHXBRvollOH9/PqvFSSS:9yB45X/SmyluORjzwXWlOH9/CvFS7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-