General
-
Target
5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c
-
Size
836KB
-
Sample
230319-pl1zpsad3s
-
MD5
de1c0df499a0bcddb6c3e982e8be33c6
-
SHA1
5bb5a00009f726115a9fd71602d6fe40f088ed9c
-
SHA256
5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c
-
SHA512
59321b04eb40b57b61ee9f400db542aef4dcce7fcc583f8fd63bcee1490fe98cc969336a55532261fd586dadd514cf60f07920c6c981b5c0d236492a9c7d8590
-
SSDEEP
12288:1Mrmy90xJYxVjfF6AgFS/90+Ud4+yHxUVp4hQIrKborYB4gXZqUaRheSbdVqH:3ypBSFS/k4t46rKbBZZqUaaSaH
Static task
static1
Behavioral task
behavioral1
Sample
5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Targets
-
-
Target
5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c
-
Size
836KB
-
MD5
de1c0df499a0bcddb6c3e982e8be33c6
-
SHA1
5bb5a00009f726115a9fd71602d6fe40f088ed9c
-
SHA256
5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c
-
SHA512
59321b04eb40b57b61ee9f400db542aef4dcce7fcc583f8fd63bcee1490fe98cc969336a55532261fd586dadd514cf60f07920c6c981b5c0d236492a9c7d8590
-
SSDEEP
12288:1Mrmy90xJYxVjfF6AgFS/90+Ud4+yHxUVp4hQIrKborYB4gXZqUaRheSbdVqH:3ypBSFS/k4t46rKbBZZqUaaSaH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-