General
-
Target
24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0
-
Size
699KB
-
Sample
230327-15vsksfe84
-
MD5
10619f6a2bf6b929981c72917e308a05
-
SHA1
b0085e52f46056c7ae391adba1af8b2783704f87
-
SHA256
24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0
-
SHA512
11aea4bb8e7123ceaa6fe13693be583f9a0f2eaaf8efaead66b8c4c4a10c0f8e095c49d9419966f6e775e04cca58b37aff85c630fde0b783598347a2538f9301
-
SSDEEP
12288:oMrry90cICddHIEql9DuZcAY+pHLNDk0W9ea/b4m8Qixj7dO1zTQzqOC:TyrIQzY+pC0W4Akm8lxHdWzTn3
Static task
static1
Behavioral task
behavioral1
Sample
24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0
-
Size
699KB
-
MD5
10619f6a2bf6b929981c72917e308a05
-
SHA1
b0085e52f46056c7ae391adba1af8b2783704f87
-
SHA256
24bb364eafd9c79ff7015fd86a03a06e916149a92d913318f9978c51bb49c1e0
-
SHA512
11aea4bb8e7123ceaa6fe13693be583f9a0f2eaaf8efaead66b8c4c4a10c0f8e095c49d9419966f6e775e04cca58b37aff85c630fde0b783598347a2538f9301
-
SSDEEP
12288:oMrry90cICddHIEql9DuZcAY+pHLNDk0W9ea/b4m8Qixj7dO1zTQzqOC:TyrIQzY+pC0W4Akm8lxHdWzTn3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-