General
-
Target
391434cb3ac2adfeb5b16a0d2ef4eee96d6b014c41b636fbdd9a1ee23344bb5c
-
Size
836KB
-
Sample
230321-gnv78sba3v
-
MD5
c86ce5eabcce12c381ad26e73a21b212
-
SHA1
0c84efabe6653fa92e42238bb7a34549f5bfaec0
-
SHA256
391434cb3ac2adfeb5b16a0d2ef4eee96d6b014c41b636fbdd9a1ee23344bb5c
-
SHA512
58a47165347370e25381e3a544b7bc4e5f41e8caed5cca1be1e4042fbd6dc68dc9fa0d96986d09df41ce2e42f3134575e5aa9fd7bceca70ee09dc99923169ead
-
SSDEEP
24576:7yyz6lsRXXSicTV3ExHM57H1Hsv53kSj2gGC:uvsRyiUExHi7VHsv53
Static task
static1
Behavioral task
behavioral1
Sample
391434cb3ac2adfeb5b16a0d2ef4eee96d6b014c41b636fbdd9a1ee23344bb5c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Targets
-
-
Target
391434cb3ac2adfeb5b16a0d2ef4eee96d6b014c41b636fbdd9a1ee23344bb5c
-
Size
836KB
-
MD5
c86ce5eabcce12c381ad26e73a21b212
-
SHA1
0c84efabe6653fa92e42238bb7a34549f5bfaec0
-
SHA256
391434cb3ac2adfeb5b16a0d2ef4eee96d6b014c41b636fbdd9a1ee23344bb5c
-
SHA512
58a47165347370e25381e3a544b7bc4e5f41e8caed5cca1be1e4042fbd6dc68dc9fa0d96986d09df41ce2e42f3134575e5aa9fd7bceca70ee09dc99923169ead
-
SSDEEP
24576:7yyz6lsRXXSicTV3ExHM57H1Hsv53kSj2gGC:uvsRyiUExHi7VHsv53
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-