General
-
Target
a9f1d139268416c799550a0741aeadbb.bin
-
Size
642KB
-
Sample
230328-cmw1xsge25
-
MD5
12238bef4da631fbe987eb2db2a0845a
-
SHA1
98201f1f441a87601620e4284eef35d4f261cacd
-
SHA256
a00226caf3556121a959d8de36a1290e0ee7e0721737a65921f47ecd1498e495
-
SHA512
47fd89b3b9fafd1f4f2f519dd97e2faa1798e5e66215810996c0fb7b9a956587c25763017df30d2d39a876cdc2fbd312743eb67bc5f8ed2aadf785174ccd94a0
-
SSDEEP
12288:EnlBajZ95Oro/j86Qc1ByxoFfpC8c1hA8k0YH9FEna+eVR4xnb:6Ba9z1hC8eAPxH9ya+en8b
Static task
static1
Behavioral task
behavioral1
Sample
0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Targets
-
-
Target
0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55.exe
-
Size
686KB
-
MD5
a9f1d139268416c799550a0741aeadbb
-
SHA1
a2c3f3ff9443023114b94add4f7a30c165edd50c
-
SHA256
0cad2cfc06b38439809d62e1c5ca38068fce11b1442dbdb4eaa32e68c2914b55
-
SHA512
98c777aad810b357603e82505fa13681ebe777f71cdf6d4a94a7272f9516429d3b338f3256b12d9d41855725f73964866db227bef6cb18c69bb3e8e377ce59d8
-
SSDEEP
12288:9MrQy903BCHk07CUdCa9RW4mTc73ZR+OYmMJuH64N4k4kk+B6q9wcK:Ny5XeU00+JuiiDDK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-