General
-
Target
f54b49727543f5ffad1e196b439467195f2a9c348fd4ccb32b027cf6670d9d24
-
Size
818KB
-
Sample
230319-25ddzaaf33
-
MD5
cedf9dc36189f7b509953d8d31d9c1ad
-
SHA1
f1ac8520b1a6f1f277f143a83a26b4f85dbf9971
-
SHA256
f54b49727543f5ffad1e196b439467195f2a9c348fd4ccb32b027cf6670d9d24
-
SHA512
6677d5416732e143154495ace6ac43b41472db10012e339d59fa86e7d4a66cd449d768041a6fc9af5b279518f5ddbf52df10edc47ea4a68aaca4e8f169a938f7
-
SSDEEP
24576:vy957QbfGXfi6WEl4gnCF+v8l8UiOkz/w1SsZTeZR:6TkbIflemAA41nR
Static task
static1
Behavioral task
behavioral1
Sample
f54b49727543f5ffad1e196b439467195f2a9c348fd4ccb32b027cf6670d9d24.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Targets
-
-
Target
f54b49727543f5ffad1e196b439467195f2a9c348fd4ccb32b027cf6670d9d24
-
Size
818KB
-
MD5
cedf9dc36189f7b509953d8d31d9c1ad
-
SHA1
f1ac8520b1a6f1f277f143a83a26b4f85dbf9971
-
SHA256
f54b49727543f5ffad1e196b439467195f2a9c348fd4ccb32b027cf6670d9d24
-
SHA512
6677d5416732e143154495ace6ac43b41472db10012e339d59fa86e7d4a66cd449d768041a6fc9af5b279518f5ddbf52df10edc47ea4a68aaca4e8f169a938f7
-
SSDEEP
24576:vy957QbfGXfi6WEl4gnCF+v8l8UiOkz/w1SsZTeZR:6TkbIflemAA41nR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-