General
-
Target
8bcf1d366e4863c9301e79ea6aa70379e4b77d8bc60f843cbde0c63a717844ba
-
Size
876KB
-
Sample
230321-tzpwtadh91
-
MD5
c5affe8bbad9dd13ee70f893e34fc219
-
SHA1
8aca16a71024b420d76bf98b1fec52080ef09663
-
SHA256
8bcf1d366e4863c9301e79ea6aa70379e4b77d8bc60f843cbde0c63a717844ba
-
SHA512
b82b8395d33de83f3a98c8baa8acfa063c5399adfb95d0fa5922f814e32b996c9e695c80abb7fe6f337dffb5eae42b91ceabc800341a56bdbebc3a4aaf12034a
-
SSDEEP
12288:bMrwy90oCId29rzk/D4R5EW+dblzTSC/lMwAEBdx2NzgPe0XnNqyqZ8GjWoXteek:byb7SedW27lx1t3Ayq8Gjjz/M
Static task
static1
Behavioral task
behavioral1
Sample
8bcf1d366e4863c9301e79ea6aa70379e4b77d8bc60f843cbde0c63a717844ba.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Targets
-
-
Target
8bcf1d366e4863c9301e79ea6aa70379e4b77d8bc60f843cbde0c63a717844ba
-
Size
876KB
-
MD5
c5affe8bbad9dd13ee70f893e34fc219
-
SHA1
8aca16a71024b420d76bf98b1fec52080ef09663
-
SHA256
8bcf1d366e4863c9301e79ea6aa70379e4b77d8bc60f843cbde0c63a717844ba
-
SHA512
b82b8395d33de83f3a98c8baa8acfa063c5399adfb95d0fa5922f814e32b996c9e695c80abb7fe6f337dffb5eae42b91ceabc800341a56bdbebc3a4aaf12034a
-
SSDEEP
12288:bMrwy90oCId29rzk/D4R5EW+dblzTSC/lMwAEBdx2NzgPe0XnNqyqZ8GjWoXteek:byb7SedW27lx1t3Ayq8Gjjz/M
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-