General
-
Target
44b258fae2ab8d53fa338a2888df5032af4d2559e807b43d09db623cc50a0a61
-
Size
705KB
-
Sample
230327-17d8lsfe97
-
MD5
b3ead806c04ed54a75c3ddb5339f2f9c
-
SHA1
1d4ac76a5cdeaca75994cbc93540f93a7d478254
-
SHA256
44b258fae2ab8d53fa338a2888df5032af4d2559e807b43d09db623cc50a0a61
-
SHA512
017019725d4c4c1c549c804fafb3da44ddc6e46d5e1a0c878eb7edf4e7c7053a60f0887ff9ba4aaeaf61a2d03cb13ffe1dbb0670906a7cf96d8f461c9ee9af7f
-
SSDEEP
12288:be42StnJqYU2E8wGHAoYuYvX2M8tA2NLLMcWKdAo:be4tMY9EMHAS5lkKdAo
Static task
static1
Behavioral task
behavioral1
Sample
44b258fae2ab8d53fa338a2888df5032af4d2559e807b43d09db623cc50a0a61.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
44b258fae2ab8d53fa338a2888df5032af4d2559e807b43d09db623cc50a0a61.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
44b258fae2ab8d53fa338a2888df5032af4d2559e807b43d09db623cc50a0a61
-
Size
705KB
-
MD5
b3ead806c04ed54a75c3ddb5339f2f9c
-
SHA1
1d4ac76a5cdeaca75994cbc93540f93a7d478254
-
SHA256
44b258fae2ab8d53fa338a2888df5032af4d2559e807b43d09db623cc50a0a61
-
SHA512
017019725d4c4c1c549c804fafb3da44ddc6e46d5e1a0c878eb7edf4e7c7053a60f0887ff9ba4aaeaf61a2d03cb13ffe1dbb0670906a7cf96d8f461c9ee9af7f
-
SSDEEP
12288:be42StnJqYU2E8wGHAoYuYvX2M8tA2NLLMcWKdAo:be4tMY9EMHAS5lkKdAo
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-