General
-
Target
0ccf8b8966f99eb6a6bc323561701bc6f2f7263013affd398024119451a5a970
-
Size
578KB
-
Sample
230607-mxsrcshf68
-
MD5
bb1ba9be03ff408727d807a41ec12386
-
SHA1
944697789e2978114710ad08670633983ba163ad
-
SHA256
0ccf8b8966f99eb6a6bc323561701bc6f2f7263013affd398024119451a5a970
-
SHA512
cee4fe9f1e273a86badd859388f5d462915a92f5e7fb1a69b3d2853eced3291f29f0f7fa9e8f6b81a66e48d374b9d6c70ec6ff730e3159e7a7e5f8098fa81ab6
-
SSDEEP
12288:bMrZy908kke83f3qTEBVy33Dr1GtTiHCy+UIUig4:2yhvDyjuiHCsig4
Static task
static1
Behavioral task
behavioral1
Sample
0ccf8b8966f99eb6a6bc323561701bc6f2f7263013affd398024119451a5a970.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
doxa
83.97.73.129:19068
-
auth_value
8cf5ba009458c73b014353d79d8422c6
Targets
-
-
Target
0ccf8b8966f99eb6a6bc323561701bc6f2f7263013affd398024119451a5a970
-
Size
578KB
-
MD5
bb1ba9be03ff408727d807a41ec12386
-
SHA1
944697789e2978114710ad08670633983ba163ad
-
SHA256
0ccf8b8966f99eb6a6bc323561701bc6f2f7263013affd398024119451a5a970
-
SHA512
cee4fe9f1e273a86badd859388f5d462915a92f5e7fb1a69b3d2853eced3291f29f0f7fa9e8f6b81a66e48d374b9d6c70ec6ff730e3159e7a7e5f8098fa81ab6
-
SSDEEP
12288:bMrZy908kke83f3qTEBVy33Dr1GtTiHCy+UIUig4:2yhvDyjuiHCsig4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-