General
-
Target
9e32a4c307f99a95a7fdccc2aee91fa63b4b71b42b6fe553fac037899c48b900
-
Size
776KB
-
Sample
230320-h948pscc77
-
MD5
86a112b0bf877e0a5c8b136e1b9ec74b
-
SHA1
5e2b0553096e254a8a605812b55abd981fd15ed1
-
SHA256
9e32a4c307f99a95a7fdccc2aee91fa63b4b71b42b6fe553fac037899c48b900
-
SHA512
73893f85ec9d81ebc01b38a108319d1e80dfd8b5ef63dfc16cd5cfb1ccc5ba66314fd862723b9d3c4a29568491896d9a138c1ae1451379e97960e26371717533
-
SSDEEP
12288:gMrJy902cfsCKauL9D8hWcQ5TZlC3Rg6XBjfijkePNFWZVGcFYzN:5yNxaWEQ5TZlExjajkeNQGcUN
Static task
static1
Behavioral task
behavioral1
Sample
9e32a4c307f99a95a7fdccc2aee91fa63b4b71b42b6fe553fac037899c48b900.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Targets
-
-
Target
9e32a4c307f99a95a7fdccc2aee91fa63b4b71b42b6fe553fac037899c48b900
-
Size
776KB
-
MD5
86a112b0bf877e0a5c8b136e1b9ec74b
-
SHA1
5e2b0553096e254a8a605812b55abd981fd15ed1
-
SHA256
9e32a4c307f99a95a7fdccc2aee91fa63b4b71b42b6fe553fac037899c48b900
-
SHA512
73893f85ec9d81ebc01b38a108319d1e80dfd8b5ef63dfc16cd5cfb1ccc5ba66314fd862723b9d3c4a29568491896d9a138c1ae1451379e97960e26371717533
-
SSDEEP
12288:gMrJy902cfsCKauL9D8hWcQ5TZlC3Rg6XBjfijkePNFWZVGcFYzN:5yNxaWEQ5TZlExjajkeNQGcUN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-