General
-
Target
83f78fc4ff8244e7b91da09f50ccdbaa.exe
-
Size
680KB
-
Sample
230327-13xjdsfe65
-
MD5
83f78fc4ff8244e7b91da09f50ccdbaa
-
SHA1
d43e6728f33c5e24a98ef0ce27a481877ac9a00e
-
SHA256
1ed3acc8e9c4836587e1a70d34f9b860355033c57b96929138e4f91912bbc4c1
-
SHA512
1ba9026129dc7144b4da58c41e59e9b289b071ec41525970b6410376cd81bfd2accd68b2512e65696efc6b37f33342d8b79ee96040fc72ec184a1ca0803c267c
-
SSDEEP
12288:VGEAzyEWuWxSGEFbgUU/T/G9qPkdFJQZ5AOOiCKAGePUBr:VGFWuiSGEFbgUUeqPkdFJoWOOC51
Static task
static1
Behavioral task
behavioral1
Sample
83f78fc4ff8244e7b91da09f50ccdbaa.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
83f78fc4ff8244e7b91da09f50ccdbaa.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
83f78fc4ff8244e7b91da09f50ccdbaa.exe
-
Size
680KB
-
MD5
83f78fc4ff8244e7b91da09f50ccdbaa
-
SHA1
d43e6728f33c5e24a98ef0ce27a481877ac9a00e
-
SHA256
1ed3acc8e9c4836587e1a70d34f9b860355033c57b96929138e4f91912bbc4c1
-
SHA512
1ba9026129dc7144b4da58c41e59e9b289b071ec41525970b6410376cd81bfd2accd68b2512e65696efc6b37f33342d8b79ee96040fc72ec184a1ca0803c267c
-
SSDEEP
12288:VGEAzyEWuWxSGEFbgUU/T/G9qPkdFJQZ5AOOiCKAGePUBr:VGFWuiSGEFbgUUeqPkdFJoWOOC51
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-