General
-
Target
8225c0c17261072f34834c2efb8115e696d85f9e293c4d1fc1a3f37f2a6f8495
-
Size
699KB
-
Sample
230327-17q76sff23
-
MD5
8538ef52091c15483f2f58d3b2499450
-
SHA1
da8a8da427e1ce9ff9a761cd3cffe89e05ab04a0
-
SHA256
8225c0c17261072f34834c2efb8115e696d85f9e293c4d1fc1a3f37f2a6f8495
-
SHA512
4d38ccebe941497d331e3054bf49c1a6f35af51d6660efa1667dcc7cd7adabd2e5132737b13521f09c34dc6a99fe3e4720eeffb1e7632279ea906c81839e5cf2
-
SSDEEP
12288:NMrDy90HbGIOaEgW4CP/e5WTTC8VVJd8RbdmNHJrSQgz0j7TCYfwhX+KUPNReuCI:Gyb1aEgWPmCCEVJdadi00HTPfwhXgtFF
Static task
static1
Behavioral task
behavioral1
Sample
8225c0c17261072f34834c2efb8115e696d85f9e293c4d1fc1a3f37f2a6f8495.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
8225c0c17261072f34834c2efb8115e696d85f9e293c4d1fc1a3f37f2a6f8495
-
Size
699KB
-
MD5
8538ef52091c15483f2f58d3b2499450
-
SHA1
da8a8da427e1ce9ff9a761cd3cffe89e05ab04a0
-
SHA256
8225c0c17261072f34834c2efb8115e696d85f9e293c4d1fc1a3f37f2a6f8495
-
SHA512
4d38ccebe941497d331e3054bf49c1a6f35af51d6660efa1667dcc7cd7adabd2e5132737b13521f09c34dc6a99fe3e4720eeffb1e7632279ea906c81839e5cf2
-
SSDEEP
12288:NMrDy90HbGIOaEgW4CP/e5WTTC8VVJd8RbdmNHJrSQgz0j7TCYfwhX+KUPNReuCI:Gyb1aEgWPmCCEVJdadi00HTPfwhXgtFF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-