General
-
Target
3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e
-
Size
567KB
-
Sample
230504-fbgcwabh2w
-
MD5
8d1f322de47d7a5c8be9f01041e5f0b9
-
SHA1
f2aaffffcd7330f7024294aaded8b67a7068066d
-
SHA256
3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e
-
SHA512
df3ca2e0c118c885d5d1299c5c0ca019c990e46a9d625978dd746a1479a2740a20e5f436fae107ba894205e46686a127579babd914914d3d47b07bd6b340a6ee
-
SSDEEP
12288:AMrCy90SbHmWQAt4giajmpvOWQ5McekES3E4hbo1O5:Sy9ixgiajOvOWQehV1e
Static task
static1
Behavioral task
behavioral1
Sample
3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Targets
-
-
Target
3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e
-
Size
567KB
-
MD5
8d1f322de47d7a5c8be9f01041e5f0b9
-
SHA1
f2aaffffcd7330f7024294aaded8b67a7068066d
-
SHA256
3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e
-
SHA512
df3ca2e0c118c885d5d1299c5c0ca019c990e46a9d625978dd746a1479a2740a20e5f436fae107ba894205e46686a127579babd914914d3d47b07bd6b340a6ee
-
SSDEEP
12288:AMrCy90SbHmWQAt4giajmpvOWQ5McekES3E4hbo1O5:Sy9ixgiajOvOWQehV1e
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-