General
-
Target
0d88bb7e2c87029c60f7dc4ff9c96b9e.bin
-
Size
642KB
-
Sample
230328-bggtdaaa4w
-
MD5
14b43eb29c8be8b1f63af5472380610e
-
SHA1
ce8f8aea4a9322e64128cf8a739dce7b28d29419
-
SHA256
fd021c9d1ce155b147898f9d8d9b2add1c93b6b1179621e0ec99db9daa7b9819
-
SHA512
a40c932df031a50d1c83dc586e032db9e3f4a3ec7621233c10643ac5291ffe0a0e9cf4b1402e405b9a84b4fc662977e8d5e29c0e2dab31a212c83a83a5fc3720
-
SSDEEP
12288:vODYXG+OxOJoVyGvGdaqcpMPhQatpTWRPRSqdUyZ/nxGxBJaE1mls16BFMvFHIaP:20XiWBcp2ZLWBR7U8xGnJ/edFM9HIazT
Static task
static1
Behavioral task
behavioral1
Sample
ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Targets
-
-
Target
ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe
-
Size
686KB
-
MD5
0d88bb7e2c87029c60f7dc4ff9c96b9e
-
SHA1
7414b47b0831b73f297e4cf7692f1bb7abf1ebfc
-
SHA256
ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047
-
SHA512
239559e6bff3a55405372333a589f6d09f1cc5f9f16214880170d7cf312c2ada2ef68e70b5e4f4425ceb87d2064849a41c0799e02543784146c8dbe3e2d0173a
-
SSDEEP
12288:IMrfy90j872tpvCck7igA3bwcEDG6rz4F28PeVB:XyQ88vCcj3eH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-