General
-
Target
41e0dc655a56ddba52020cdd9d61130d0b7c4f0eb37d8338bfbfe9bfdfd7109c
-
Size
878KB
-
Sample
230321-tkpx9sdh4t
-
MD5
83ef09f9ec22056d1ac5174009341d16
-
SHA1
0987f8a683c4f042f63a0c8ac7c9a06aff04764f
-
SHA256
41e0dc655a56ddba52020cdd9d61130d0b7c4f0eb37d8338bfbfe9bfdfd7109c
-
SHA512
6f9eb9efe5bc1a02719bce4b17cc72a6927a315424fd6cdfe921bf8cd458e2f378eabad9dc7c93c0aa2fb00b15666bf67f7873f290850f54bae5e28eb1f74abc
-
SSDEEP
24576:vyQMe2nK6WH2lajwKRJnqMDQldTr4n/yn0lN:6/e2K6G2l6ncryyn0l
Static task
static1
Behavioral task
behavioral1
Sample
41e0dc655a56ddba52020cdd9d61130d0b7c4f0eb37d8338bfbfe9bfdfd7109c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Targets
-
-
Target
41e0dc655a56ddba52020cdd9d61130d0b7c4f0eb37d8338bfbfe9bfdfd7109c
-
Size
878KB
-
MD5
83ef09f9ec22056d1ac5174009341d16
-
SHA1
0987f8a683c4f042f63a0c8ac7c9a06aff04764f
-
SHA256
41e0dc655a56ddba52020cdd9d61130d0b7c4f0eb37d8338bfbfe9bfdfd7109c
-
SHA512
6f9eb9efe5bc1a02719bce4b17cc72a6927a315424fd6cdfe921bf8cd458e2f378eabad9dc7c93c0aa2fb00b15666bf67f7873f290850f54bae5e28eb1f74abc
-
SSDEEP
24576:vyQMe2nK6WH2lajwKRJnqMDQldTr4n/yn0lN:6/e2K6G2l6ncryyn0l
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-