General
-
Target
4923f5671f564176c18c501518abe7a2322d41c2cf6a64eac032f9c0a8dd2718
-
Size
906KB
-
Sample
230321-wg25jacc95
-
MD5
8d048c610710d2e30364b0cd71f8eb2b
-
SHA1
0353ab18a2b4bc15f0dc0eab4639b9674e78267b
-
SHA256
4923f5671f564176c18c501518abe7a2322d41c2cf6a64eac032f9c0a8dd2718
-
SHA512
87b0d138e703f65b7ae42413fa9e02986c578db801afef9db08e5e2475ff65dd59bc69bca905edd07f5e80e81530ae8ed5a7ebaab3565e1d37517054435856e7
-
SSDEEP
24576:DyeQ5tDCXCRzH9OGw77DXgQvLskqD3Po3zbw3mqc:WeQ5tDwCl9N0LQDC
Static task
static1
Behavioral task
behavioral1
Sample
4923f5671f564176c18c501518abe7a2322d41c2cf6a64eac032f9c0a8dd2718.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Targets
-
-
Target
4923f5671f564176c18c501518abe7a2322d41c2cf6a64eac032f9c0a8dd2718
-
Size
906KB
-
MD5
8d048c610710d2e30364b0cd71f8eb2b
-
SHA1
0353ab18a2b4bc15f0dc0eab4639b9674e78267b
-
SHA256
4923f5671f564176c18c501518abe7a2322d41c2cf6a64eac032f9c0a8dd2718
-
SHA512
87b0d138e703f65b7ae42413fa9e02986c578db801afef9db08e5e2475ff65dd59bc69bca905edd07f5e80e81530ae8ed5a7ebaab3565e1d37517054435856e7
-
SSDEEP
24576:DyeQ5tDCXCRzH9OGw77DXgQvLskqD3Po3zbw3mqc:WeQ5tDwCl9N0LQDC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-