General
-
Target
0d5e17586cd55b1a24fe43632551a85c76872f7bad33effafc954c3b10718ac7
-
Size
699KB
-
Sample
230327-1y3jvahe21
-
MD5
d9c0f2cf1287db246724ac4f7e1cb2ef
-
SHA1
5078e2c2268c4c02e569f2ab00241dcd47035123
-
SHA256
0d5e17586cd55b1a24fe43632551a85c76872f7bad33effafc954c3b10718ac7
-
SHA512
8a5055ce5954599b3e7cff7e4c16b0f2a5967caf4043727ae4e49c8d24959e7e22bd8995840f8c71d5774fd2d3a058913d12d75ec1a2b0568844bbb1fc1914e9
-
SSDEEP
12288:kMrZy90Etf6B6Sxb9D7hcA5JOAO9vp0kj7ASiz5/nRz:FyJSB625JOAy9HAL/nRz
Static task
static1
Behavioral task
behavioral1
Sample
0d5e17586cd55b1a24fe43632551a85c76872f7bad33effafc954c3b10718ac7.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
0d5e17586cd55b1a24fe43632551a85c76872f7bad33effafc954c3b10718ac7
-
Size
699KB
-
MD5
d9c0f2cf1287db246724ac4f7e1cb2ef
-
SHA1
5078e2c2268c4c02e569f2ab00241dcd47035123
-
SHA256
0d5e17586cd55b1a24fe43632551a85c76872f7bad33effafc954c3b10718ac7
-
SHA512
8a5055ce5954599b3e7cff7e4c16b0f2a5967caf4043727ae4e49c8d24959e7e22bd8995840f8c71d5774fd2d3a058913d12d75ec1a2b0568844bbb1fc1914e9
-
SSDEEP
12288:kMrZy90Etf6B6Sxb9D7hcA5JOAO9vp0kj7ASiz5/nRz:FyJSB625JOAy9HAL/nRz
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-