General
-
Target
b6025bc34ab1f1733df93fe3414eea87bca0fecc4218d54002ca66d9dbd99495
-
Size
835KB
-
Sample
230321-mf6xnahg47
-
MD5
bebe0afbdd854802353d04cb16958dd5
-
SHA1
924ca47f474c686ecb5db33aff7156331732c33e
-
SHA256
b6025bc34ab1f1733df93fe3414eea87bca0fecc4218d54002ca66d9dbd99495
-
SHA512
de23901a7011001eb279e85b0b9b6d8249ce3f0278e2a56842ace904b23a2a8ec007d733da8858c3af97edd10375de8bf208e69c73df9b8d064f7e9cdbf36005
-
SSDEEP
24576:wyq9L84fCZ8UnV2v7cEXvXmln2xfJKAFXLc+FHVy:3WLBnUVImlnafJKAZc+FHV
Static task
static1
Behavioral task
behavioral1
Sample
b6025bc34ab1f1733df93fe3414eea87bca0fecc4218d54002ca66d9dbd99495.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Targets
-
-
Target
b6025bc34ab1f1733df93fe3414eea87bca0fecc4218d54002ca66d9dbd99495
-
Size
835KB
-
MD5
bebe0afbdd854802353d04cb16958dd5
-
SHA1
924ca47f474c686ecb5db33aff7156331732c33e
-
SHA256
b6025bc34ab1f1733df93fe3414eea87bca0fecc4218d54002ca66d9dbd99495
-
SHA512
de23901a7011001eb279e85b0b9b6d8249ce3f0278e2a56842ace904b23a2a8ec007d733da8858c3af97edd10375de8bf208e69c73df9b8d064f7e9cdbf36005
-
SSDEEP
24576:wyq9L84fCZ8UnV2v7cEXvXmln2xfJKAFXLc+FHVy:3WLBnUVImlnafJKAZc+FHV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-