General
-
Target
de734adc60eb131b0705c8e61c3647f05acb687684ee174ae561a6ca981ab733
-
Size
877KB
-
Sample
230321-twypjsbh75
-
MD5
9b49a575a02d3bde55c34101932bc1fe
-
SHA1
2d3c3591804ade68db02f797c8155c916a82c58d
-
SHA256
de734adc60eb131b0705c8e61c3647f05acb687684ee174ae561a6ca981ab733
-
SHA512
fd069edc4cdb1b2016d1c722bff26ba7996fae90ffb27ea0dc062813540265b6b9116ef2f8732a53d30bf1578a062d2145af36148751af4e911dc9b557d32bae
-
SSDEEP
24576:ayakz1CRsFOtcz/w2hnDcLA5UZxrQhSPP/Oo:hPCyFOCng8O/shaP/
Static task
static1
Behavioral task
behavioral1
Sample
de734adc60eb131b0705c8e61c3647f05acb687684ee174ae561a6ca981ab733.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Targets
-
-
Target
de734adc60eb131b0705c8e61c3647f05acb687684ee174ae561a6ca981ab733
-
Size
877KB
-
MD5
9b49a575a02d3bde55c34101932bc1fe
-
SHA1
2d3c3591804ade68db02f797c8155c916a82c58d
-
SHA256
de734adc60eb131b0705c8e61c3647f05acb687684ee174ae561a6ca981ab733
-
SHA512
fd069edc4cdb1b2016d1c722bff26ba7996fae90ffb27ea0dc062813540265b6b9116ef2f8732a53d30bf1578a062d2145af36148751af4e911dc9b557d32bae
-
SSDEEP
24576:ayakz1CRsFOtcz/w2hnDcLA5UZxrQhSPP/Oo:hPCyFOCng8O/shaP/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-