General
-
Target
bc65bc1ae42f0a6c481afa141a204157eb9d5aff24834dfbeccf050984548f17
-
Size
478KB
-
Sample
230506-qj37qabe8s
-
MD5
fa2b97f626174c4af4482c5f8cb1ad6a
-
SHA1
5b03722b85c3ed586ed7f5cc665b4eaccbc339b6
-
SHA256
bc65bc1ae42f0a6c481afa141a204157eb9d5aff24834dfbeccf050984548f17
-
SHA512
fe5d7cf7a9563e95e2f6eaf6eb5de072a9859590ab0a9ee5af107f8992f2b062e4538d3f43c907e45dd23b0ccbbbd27e05571f022f94ec17a5e7874613a79f90
-
SSDEEP
12288:wMrQy90JcQDNVyzY05c1u31dTUcLW7ufq3Bj:wyEq7XbT3W7ufwR
Static task
static1
Behavioral task
behavioral1
Sample
bc65bc1ae42f0a6c481afa141a204157eb9d5aff24834dfbeccf050984548f17.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Targets
-
-
Target
bc65bc1ae42f0a6c481afa141a204157eb9d5aff24834dfbeccf050984548f17
-
Size
478KB
-
MD5
fa2b97f626174c4af4482c5f8cb1ad6a
-
SHA1
5b03722b85c3ed586ed7f5cc665b4eaccbc339b6
-
SHA256
bc65bc1ae42f0a6c481afa141a204157eb9d5aff24834dfbeccf050984548f17
-
SHA512
fe5d7cf7a9563e95e2f6eaf6eb5de072a9859590ab0a9ee5af107f8992f2b062e4538d3f43c907e45dd23b0ccbbbd27e05571f022f94ec17a5e7874613a79f90
-
SSDEEP
12288:wMrQy90JcQDNVyzY05c1u31dTUcLW7ufq3Bj:wyEq7XbT3W7ufwR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-