General
-
Target
354c85a42efa4053b0dcaec9feb41be3.bin
-
Size
641KB
-
Sample
230328-bpwx9sgc34
-
MD5
ea2f4b1aee4425d076a4dce7e117dcfd
-
SHA1
d542ba0ff3360cdc40dae5adcbef137982c5504e
-
SHA256
9759bfb5973355aeb27954030ae3814c6032cb92af87a5cd450a17819fba3692
-
SHA512
e02e89c2cefaecdb73cc56e1c49dc48f7d95f3261bec626eb126e931019c32d390c513d2bf7c1f2fca4cdb1fd5857a56f6cc0a3cccc6b34bb08c06312646eae2
-
SSDEEP
12288:ZRwnnc6crkX/hYgXPmBNmF8c+ED6KpQDhaQSz6vgE41bmCSI7A1Wwrzw55vRvfv:Z+nqK5YKOBVc+ED6tD0m41bLREWwr05X
Static task
static1
Behavioral task
behavioral1
Sample
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Targets
-
-
Target
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926.exe
-
Size
685KB
-
MD5
354c85a42efa4053b0dcaec9feb41be3
-
SHA1
4f05959c72e73ed28d40436010218f72b46ffdbe
-
SHA256
1e440e94a5664226435188e81b308971a4982a7c7c130c69f90ffdb21df9c926
-
SHA512
138b18137a879633b2bf4603e1b86005c2fa7b0b6f6dc70e57181b7f0ea32184480d0583e3e3bcf8c9a379e10f75c695c9f880d4aa25c30fd6ca7ac005846d8a
-
SSDEEP
12288:pMrSy90t6ss+VnNqL4GEjlX8eoNK6xR4O2UtcL:Tya6vmpFuDS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-