General
-
Target
40e3ab2ecd9822128d605ce1a1b84088e82cacce54bbe3464130f10ab7323333
-
Size
877KB
-
Sample
230321-qtw66aaf84
-
MD5
b6b181bb2dcef91a5e67f0ab6714660f
-
SHA1
3fb5873ad7b8c351d35ab802de0f6cc3c46c38e2
-
SHA256
40e3ab2ecd9822128d605ce1a1b84088e82cacce54bbe3464130f10ab7323333
-
SHA512
a2bf9734563887a55b49d48b0c37f3b02b0d033f0286eceba077e43cab86a1f58a0db99da8441e456fd1776c6f7b831068f24f79f8f1c29a32c5df057bc5ff98
-
SSDEEP
24576:qynQxg3xnR0Dz7shxQqRw98jdAZkqzTminwO9k:xrR0/7shxDmkqGinw
Static task
static1
Behavioral task
behavioral1
Sample
40e3ab2ecd9822128d605ce1a1b84088e82cacce54bbe3464130f10ab7323333.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Targets
-
-
Target
40e3ab2ecd9822128d605ce1a1b84088e82cacce54bbe3464130f10ab7323333
-
Size
877KB
-
MD5
b6b181bb2dcef91a5e67f0ab6714660f
-
SHA1
3fb5873ad7b8c351d35ab802de0f6cc3c46c38e2
-
SHA256
40e3ab2ecd9822128d605ce1a1b84088e82cacce54bbe3464130f10ab7323333
-
SHA512
a2bf9734563887a55b49d48b0c37f3b02b0d033f0286eceba077e43cab86a1f58a0db99da8441e456fd1776c6f7b831068f24f79f8f1c29a32c5df057bc5ff98
-
SSDEEP
24576:qynQxg3xnR0Dz7shxQqRw98jdAZkqzTminwO9k:xrR0/7shxDmkqGinw
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-