General
-
Target
a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6
-
Size
1.3MB
-
Sample
230301-wdlclshd42
-
MD5
58c13aa04075aa6a6f83393d256fb82a
-
SHA1
af3f7d6f4c41d0c67964c93c922c9ccabdf4eaef
-
SHA256
a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6
-
SHA512
a4e17116e4b31514d5dcc2b7ddf24b155d4c4ebcc3b6b1b3b334b6a529017ee3f740f3ee08fcbf1b3ce7fea11c0a06257562797b7703c9df3a85c4e20a7928f6
-
SSDEEP
24576:syrjby7BLclszJOSJ+Seqczux5rc8mC2VRQfUdsl+Rzx/c+wufNWlHb:b3YBLkQJ+Sery5rc8mCkeU+ozx/3U
Static task
static1
Behavioral task
behavioral1
Sample
a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Targets
-
-
Target
a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6
-
Size
1.3MB
-
MD5
58c13aa04075aa6a6f83393d256fb82a
-
SHA1
af3f7d6f4c41d0c67964c93c922c9ccabdf4eaef
-
SHA256
a27c3ef28a2ff46671f4bdec4e98ee6ff500063f5c493bbc3fc758b43dc5adb6
-
SHA512
a4e17116e4b31514d5dcc2b7ddf24b155d4c4ebcc3b6b1b3b334b6a529017ee3f740f3ee08fcbf1b3ce7fea11c0a06257562797b7703c9df3a85c4e20a7928f6
-
SSDEEP
24576:syrjby7BLclszJOSJ+Seqczux5rc8mC2VRQfUdsl+Rzx/c+wufNWlHb:b3YBLkQJ+Sery5rc8mCkeU+ozx/3U
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-