General
-
Target
39ab473d8dc9a32bb4fc31c6505d5c93f44cbf294f4c95e1f1ca0b9543ef3f40
-
Size
835KB
-
Sample
230321-gmeh4aba3s
-
MD5
34442b996c168540156865a1951aa7d6
-
SHA1
cbeec757f6b890f697aeeeff9d18b1a504bf7f5c
-
SHA256
39ab473d8dc9a32bb4fc31c6505d5c93f44cbf294f4c95e1f1ca0b9543ef3f40
-
SHA512
9c6c43abc5b8aa877ce4385425d8c5b79dcfe3490273f57a6d4a662a1b4d3854666758690a89c2bb7784f1df6cef0d9d2aeb228b14ecb6324736f449a6fae3f1
-
SSDEEP
12288:jMrVy90oEump5tF/9jVvAPLJh3OTaXkqCCJ36Ted5RDlqbHB8bMkpntDsjocRJw:Cyinb+JgTVqiCd/lqbHfkpnSj7RJw
Static task
static1
Behavioral task
behavioral1
Sample
39ab473d8dc9a32bb4fc31c6505d5c93f44cbf294f4c95e1f1ca0b9543ef3f40.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Targets
-
-
Target
39ab473d8dc9a32bb4fc31c6505d5c93f44cbf294f4c95e1f1ca0b9543ef3f40
-
Size
835KB
-
MD5
34442b996c168540156865a1951aa7d6
-
SHA1
cbeec757f6b890f697aeeeff9d18b1a504bf7f5c
-
SHA256
39ab473d8dc9a32bb4fc31c6505d5c93f44cbf294f4c95e1f1ca0b9543ef3f40
-
SHA512
9c6c43abc5b8aa877ce4385425d8c5b79dcfe3490273f57a6d4a662a1b4d3854666758690a89c2bb7784f1df6cef0d9d2aeb228b14ecb6324736f449a6fae3f1
-
SSDEEP
12288:jMrVy90oEump5tF/9jVvAPLJh3OTaXkqCCJ36Ted5RDlqbHB8bMkpntDsjocRJw:Cyinb+JgTVqiCd/lqbHfkpnSj7RJw
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-