General
-
Target
4d8bcd6de5da1e7875d2054dbd3852424b11abad68aee29c03b46ca2408626b1.exe
-
Size
379KB
-
Sample
240213-dnbl2sff42
-
MD5
b6a241c754d2e27c4a31d2967ac11ed0
-
SHA1
4fbab8a04eb9f769540053345f356e960aeaf55f
-
SHA256
4d8bcd6de5da1e7875d2054dbd3852424b11abad68aee29c03b46ca2408626b1
-
SHA512
9ae54475dc1fe059426b166d3b759a07542cce1821506d65441bde30aae33eca3f03f10be796e7c1235236643b9e64638ebf3347ec93affc70584ab30c883dc0
-
SSDEEP
3072:GW+vI883yzGPyLfVhgAaQTTATeju3Lka9BDYlPDBw6dROe8ajVgn:3+QTy6P2rrVuQG+DPDV
Static task
static1
Behavioral task
behavioral1
Sample
4d8bcd6de5da1e7875d2054dbd3852424b11abad68aee29c03b46ca2408626b1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d8bcd6de5da1e7875d2054dbd3852424b11abad68aee29c03b46ca2408626b1.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
redline
1373752142_99
https://pastebin.com/raw/8baCJyMF
Targets
-
-
Target
4d8bcd6de5da1e7875d2054dbd3852424b11abad68aee29c03b46ca2408626b1.exe
-
Size
379KB
-
MD5
b6a241c754d2e27c4a31d2967ac11ed0
-
SHA1
4fbab8a04eb9f769540053345f356e960aeaf55f
-
SHA256
4d8bcd6de5da1e7875d2054dbd3852424b11abad68aee29c03b46ca2408626b1
-
SHA512
9ae54475dc1fe059426b166d3b759a07542cce1821506d65441bde30aae33eca3f03f10be796e7c1235236643b9e64638ebf3347ec93affc70584ab30c883dc0
-
SSDEEP
3072:GW+vI883yzGPyLfVhgAaQTTATeju3Lka9BDYlPDBw6dROe8ajVgn:3+QTy6P2rrVuQG+DPDV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-