General
-
Target
3d92281389166711fdc74b15821e0ca60cc1ebedcf70ce979281a5c499d87d6a
-
Size
818KB
-
Sample
230320-c81k8sde8z
-
MD5
ce0531700a85b0d4b272375c1bc7d10b
-
SHA1
d215d17507441087e13905ad92db4c14daa86156
-
SHA256
3d92281389166711fdc74b15821e0ca60cc1ebedcf70ce979281a5c499d87d6a
-
SHA512
55db49479b71459b5d88ab7e8cf6aebfd59d40484dad806a85ae92990ddddf4442595a9a6a5de26c84d3036ea0543da0e5a6f63157bc39e8faf847d5eb180478
-
SSDEEP
24576:kyE5XTQyNd8BmBWLkQasDoY78UXBkzcPTUE+8BN:zQUyX64QaQo+Wc7UEP
Static task
static1
Behavioral task
behavioral1
Sample
3d92281389166711fdc74b15821e0ca60cc1ebedcf70ce979281a5c499d87d6a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Targets
-
-
Target
3d92281389166711fdc74b15821e0ca60cc1ebedcf70ce979281a5c499d87d6a
-
Size
818KB
-
MD5
ce0531700a85b0d4b272375c1bc7d10b
-
SHA1
d215d17507441087e13905ad92db4c14daa86156
-
SHA256
3d92281389166711fdc74b15821e0ca60cc1ebedcf70ce979281a5c499d87d6a
-
SHA512
55db49479b71459b5d88ab7e8cf6aebfd59d40484dad806a85ae92990ddddf4442595a9a6a5de26c84d3036ea0543da0e5a6f63157bc39e8faf847d5eb180478
-
SSDEEP
24576:kyE5XTQyNd8BmBWLkQasDoY78UXBkzcPTUE+8BN:zQUyX64QaQo+Wc7UEP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-