General
-
Target
db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe
-
Size
701KB
-
Sample
230327-22spgsfg44
-
MD5
0d17143e6351fcc3836467c0f7712da1
-
SHA1
f41eb3d0d29e7345cfbbf49a287d5e1be7c38624
-
SHA256
db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe
-
SHA512
51d803d58cf126dbf8d4629e3286833a0b6e24736a90db88556784a10e8b2edd000550a65553a6e32a85c4667d790ca17b9ecc3241e3f86ae347082a4b1140bf
-
SSDEEP
12288:qMr9y90DUCLLXPOe1d87r0NEhlTFluMCUv8GWK:HyE7nXPNMdhl5lSQ8zK
Static task
static1
Behavioral task
behavioral1
Sample
db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe
-
Size
701KB
-
MD5
0d17143e6351fcc3836467c0f7712da1
-
SHA1
f41eb3d0d29e7345cfbbf49a287d5e1be7c38624
-
SHA256
db77bffc81af60c9fc47eb4f30d741d35090178fc9394abfe140de4efff675fe
-
SHA512
51d803d58cf126dbf8d4629e3286833a0b6e24736a90db88556784a10e8b2edd000550a65553a6e32a85c4667d790ca17b9ecc3241e3f86ae347082a4b1140bf
-
SSDEEP
12288:qMr9y90DUCLLXPOe1d87r0NEhlTFluMCUv8GWK:HyE7nXPNMdhl5lSQ8zK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-