General
-
Target
1bdfb86c567fb1e945a6e892e10adf1637c8bc0e92cd45367a11de24e3070d0c
-
Size
1.0MB
-
Sample
230518-cg6ceagd51
-
MD5
7e3c5dd8469fae45642704ac8eb6f0a4
-
SHA1
eb56c1978ebe0f8db5d0e707305c6890daa76a55
-
SHA256
1bdfb86c567fb1e945a6e892e10adf1637c8bc0e92cd45367a11de24e3070d0c
-
SHA512
11614d1ef414c0a4b57f08ad7790c85640f231055f99d4f6e4410e664468cc9dd4c2a17da4ec958cb3225312e9f72075dd9684c0edc2915cd1f85bcc1e582b6e
-
SSDEEP
12288:pMruy90s9EhlTW+GTd5WnEInm7fT3mkcQFNEh9WLp2X/GdpjfGuECLo8ubkmW0yN:ryxW0d2m7rmkBpoPGdpLBo868ua/vd
Static task
static1
Behavioral task
behavioral1
Sample
1bdfb86c567fb1e945a6e892e10adf1637c8bc0e92cd45367a11de24e3070d0c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
luna
77.91.68.253:4138
-
auth_value
16dec8addb01db1c11c59667022ef7a2
Targets
-
-
Target
1bdfb86c567fb1e945a6e892e10adf1637c8bc0e92cd45367a11de24e3070d0c
-
Size
1.0MB
-
MD5
7e3c5dd8469fae45642704ac8eb6f0a4
-
SHA1
eb56c1978ebe0f8db5d0e707305c6890daa76a55
-
SHA256
1bdfb86c567fb1e945a6e892e10adf1637c8bc0e92cd45367a11de24e3070d0c
-
SHA512
11614d1ef414c0a4b57f08ad7790c85640f231055f99d4f6e4410e664468cc9dd4c2a17da4ec958cb3225312e9f72075dd9684c0edc2915cd1f85bcc1e582b6e
-
SSDEEP
12288:pMruy90s9EhlTW+GTd5WnEInm7fT3mkcQFNEh9WLp2X/GdpjfGuECLo8ubkmW0yN:ryxW0d2m7rmkBpoPGdpLBo868ua/vd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-