General
-
Target
file.exe
-
Size
219KB
-
Sample
231210-mhjj5sefa8
-
MD5
6dd7e327abbd8bb60a6cfb8ec5cd04e8
-
SHA1
0fd6feaee21b0204b396dfa5ca9c123e4eaf9f94
-
SHA256
044c21aed1c0a84d964c90bbd7eda49ca9b7fec0d049701ba32e7f5127113363
-
SHA512
e33a69960df8e22e2c912c51266dba29e0bf92c1bd89b14cbd892bcba52af6a866a03855ebc864d6b8e4e8f67e2a99f6b4fc772da9fefa5a2fe9bef5d96e60f6
-
SSDEEP
6144:t3K2174NgcN/rzY94NI0umhS67dfZ74pUK:t3KjNgcN/r7NI27dfZ74pUK
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
Malware Config
Extracted
redline
r1
193.233.132.55:25530
Targets
-
-
Target
file.exe
-
Size
219KB
-
MD5
6dd7e327abbd8bb60a6cfb8ec5cd04e8
-
SHA1
0fd6feaee21b0204b396dfa5ca9c123e4eaf9f94
-
SHA256
044c21aed1c0a84d964c90bbd7eda49ca9b7fec0d049701ba32e7f5127113363
-
SHA512
e33a69960df8e22e2c912c51266dba29e0bf92c1bd89b14cbd892bcba52af6a866a03855ebc864d6b8e4e8f67e2a99f6b4fc772da9fefa5a2fe9bef5d96e60f6
-
SSDEEP
6144:t3K2174NgcN/rzY94NI0umhS67dfZ74pUK:t3KjNgcN/r7NI27dfZ74pUK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Modifies Installed Components in the registry
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-