General
-
Target
3f5e12cafb928d3780aaa9f1728f6b26dc0724220e1097fa4be7902d3f017301
-
Size
480KB
-
Sample
230506-yzhvqada6z
-
MD5
ecc4781eef431be53688c4425423f85b
-
SHA1
4148265460208bb22a07ea13db960331be6b708d
-
SHA256
3f5e12cafb928d3780aaa9f1728f6b26dc0724220e1097fa4be7902d3f017301
-
SHA512
8673917b91a777bf25fd02fd9766eb6801f258991574a23283de6aeabb72869857ff32f4b16a69114c6ac2470d05a8282247c7d451b58edbdaa78dfd3b66cf68
-
SSDEEP
12288:dMrgy90N3PcjD00k8Uys9eEWDcDkGS2Goc3vvhdZg:5ySPAkD97WDcoGSjo8vvhQ
Static task
static1
Behavioral task
behavioral1
Sample
3f5e12cafb928d3780aaa9f1728f6b26dc0724220e1097fa4be7902d3f017301.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Targets
-
-
Target
3f5e12cafb928d3780aaa9f1728f6b26dc0724220e1097fa4be7902d3f017301
-
Size
480KB
-
MD5
ecc4781eef431be53688c4425423f85b
-
SHA1
4148265460208bb22a07ea13db960331be6b708d
-
SHA256
3f5e12cafb928d3780aaa9f1728f6b26dc0724220e1097fa4be7902d3f017301
-
SHA512
8673917b91a777bf25fd02fd9766eb6801f258991574a23283de6aeabb72869857ff32f4b16a69114c6ac2470d05a8282247c7d451b58edbdaa78dfd3b66cf68
-
SSDEEP
12288:dMrgy90N3PcjD00k8Uys9eEWDcDkGS2Goc3vvhdZg:5ySPAkD97WDcoGSjo8vvhQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-