General
-
Target
4b00254ff5d112b4f7552e10364f3ec321b4f00b328750ceb07c2cab52cb820c
-
Size
865KB
-
Sample
230319-f1ycpafa82
-
MD5
f8d8522026dbaa79ff9e5a90798656f4
-
SHA1
128a527b5ce1cba0c93f329673b2b26b0d25d2ba
-
SHA256
4b00254ff5d112b4f7552e10364f3ec321b4f00b328750ceb07c2cab52cb820c
-
SHA512
053b1fe9d2e271ae9203e8e94927df3264192f785c2eadc51b4da3981ce4649ee7c09bd1c10c29587c578d8cc2937156bfd160c9df6911bf9a0a0c582ee53df4
-
SSDEEP
24576:IygwqJx/o6Lv4L+DtIZiCQKwEApPJ0XRTG/O6A:PgwqJxndFFpPJ0FGv
Static task
static1
Behavioral task
behavioral1
Sample
4b00254ff5d112b4f7552e10364f3ec321b4f00b328750ceb07c2cab52cb820c.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Targets
-
-
Target
4b00254ff5d112b4f7552e10364f3ec321b4f00b328750ceb07c2cab52cb820c
-
Size
865KB
-
MD5
f8d8522026dbaa79ff9e5a90798656f4
-
SHA1
128a527b5ce1cba0c93f329673b2b26b0d25d2ba
-
SHA256
4b00254ff5d112b4f7552e10364f3ec321b4f00b328750ceb07c2cab52cb820c
-
SHA512
053b1fe9d2e271ae9203e8e94927df3264192f785c2eadc51b4da3981ce4649ee7c09bd1c10c29587c578d8cc2937156bfd160c9df6911bf9a0a0c582ee53df4
-
SSDEEP
24576:IygwqJx/o6Lv4L+DtIZiCQKwEApPJ0XRTG/O6A:PgwqJxndFFpPJ0FGv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-