General
-
Target
1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184
-
Size
818KB
-
Sample
230320-a3m2vada2y
-
MD5
83c4a8f98afee2372970c01c3b9d7a7b
-
SHA1
0e2c4b9828eaa162d41a7cf598eb1b51d7f376db
-
SHA256
1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184
-
SHA512
b6c636af185cf0f2504725826fd408694771627b59b4918f098ff8eb47ff7050c9ab5133f9bcfc614c391b7bbaec9a6b15735e381a3f0c9bb9eba68647e3c9eb
-
SSDEEP
24576:JyCc+YsHrFMJeW/acXDD+z8UErkzkJve:8Cc9sHrqvacTDIF4
Static task
static1
Behavioral task
behavioral1
Sample
1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Targets
-
-
Target
1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184
-
Size
818KB
-
MD5
83c4a8f98afee2372970c01c3b9d7a7b
-
SHA1
0e2c4b9828eaa162d41a7cf598eb1b51d7f376db
-
SHA256
1d1cbc2b72d5194ad750e8973f0c2ff174e4b4ead9168de37c42c36f3eb76184
-
SHA512
b6c636af185cf0f2504725826fd408694771627b59b4918f098ff8eb47ff7050c9ab5133f9bcfc614c391b7bbaec9a6b15735e381a3f0c9bb9eba68647e3c9eb
-
SSDEEP
24576:JyCc+YsHrFMJeW/acXDD+z8UErkzkJve:8Cc9sHrqvacTDIF4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-