General
-
Target
73c6622b710c607a45e352437f13d5f987a5f9b820b7c2a62576322e830b6fa9
-
Size
836KB
-
Sample
230321-m81akshh78
-
MD5
6593791ee9705f91245d5defeac2cbd9
-
SHA1
1b303819f6b3ced7b2038f8e9cd6e85140b82d80
-
SHA256
73c6622b710c607a45e352437f13d5f987a5f9b820b7c2a62576322e830b6fa9
-
SHA512
f797a23c473d3648e6d00a7f14ea85c2edc16277080816437415ab99a1cc1994978be822e0cdb92fa8c84ce63ce14e1dda3e6f3558a6efe66ece4a5319b6f000
-
SSDEEP
12288:kMrcy90k93yYd/Jg5w8yveyX1MKTqRcLOuEZUmI/gmTZ+uaklLYXRou8USOMblor:wyB3yYVm5uX1M4ziuECD1lOMblcz
Static task
static1
Behavioral task
behavioral1
Sample
73c6622b710c607a45e352437f13d5f987a5f9b820b7c2a62576322e830b6fa9.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Targets
-
-
Target
73c6622b710c607a45e352437f13d5f987a5f9b820b7c2a62576322e830b6fa9
-
Size
836KB
-
MD5
6593791ee9705f91245d5defeac2cbd9
-
SHA1
1b303819f6b3ced7b2038f8e9cd6e85140b82d80
-
SHA256
73c6622b710c607a45e352437f13d5f987a5f9b820b7c2a62576322e830b6fa9
-
SHA512
f797a23c473d3648e6d00a7f14ea85c2edc16277080816437415ab99a1cc1994978be822e0cdb92fa8c84ce63ce14e1dda3e6f3558a6efe66ece4a5319b6f000
-
SSDEEP
12288:kMrcy90k93yYd/Jg5w8yveyX1MKTqRcLOuEZUmI/gmTZ+uaklLYXRou8USOMblor:wyB3yYVm5uX1M4ziuECD1lOMblcz
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-