General
-
Target
54e313971b500630efaac0eb35a13e5ab1d2854b8c5b9a78fd920299aed53e20
-
Size
819KB
-
Sample
230320-bgn8fsda8x
-
MD5
f2aafbd35bd9d45a9eb4a16f6bc4a30d
-
SHA1
1f243f8e0a93f8b34eb1dec4595ff684c2c4e302
-
SHA256
54e313971b500630efaac0eb35a13e5ab1d2854b8c5b9a78fd920299aed53e20
-
SHA512
08e0cef4d0645a9a27d89f2a41461aed5ffac6f21d47a093ff7b9699d6c88def24e0dbd0aa790a16479e752733c90ff30674798240751c4f0010ae51cee20114
-
SSDEEP
24576:6ysoRtUp9SCT31Wf2W2spuCve0V8UHUkzz:B9RYICb2LFe0b
Static task
static1
Behavioral task
behavioral1
Sample
54e313971b500630efaac0eb35a13e5ab1d2854b8c5b9a78fd920299aed53e20.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Targets
-
-
Target
54e313971b500630efaac0eb35a13e5ab1d2854b8c5b9a78fd920299aed53e20
-
Size
819KB
-
MD5
f2aafbd35bd9d45a9eb4a16f6bc4a30d
-
SHA1
1f243f8e0a93f8b34eb1dec4595ff684c2c4e302
-
SHA256
54e313971b500630efaac0eb35a13e5ab1d2854b8c5b9a78fd920299aed53e20
-
SHA512
08e0cef4d0645a9a27d89f2a41461aed5ffac6f21d47a093ff7b9699d6c88def24e0dbd0aa790a16479e752733c90ff30674798240751c4f0010ae51cee20114
-
SSDEEP
24576:6ysoRtUp9SCT31Wf2W2spuCve0V8UHUkzz:B9RYICb2LFe0b
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-