General
-
Target
92267196fa2f6bb7e991368392ab91dbf501389dad24b1caa0857136fe7eb891
-
Size
705KB
-
Sample
230327-28w1gsfg66
-
MD5
14b9ba711aad97153250fc151b84242b
-
SHA1
bfea2fbb85c3c0c766a2f267841ca41274853e63
-
SHA256
92267196fa2f6bb7e991368392ab91dbf501389dad24b1caa0857136fe7eb891
-
SHA512
0e48a1dec6d644c8cc64660db65816711febed32011cfd54b7de9998650bc78d066c9542b92d5f8f9015329f62c29573644dc6bfe76a08683faf37a7c1f9e4ae
-
SSDEEP
12288:8Q8/I5IsZj2qAcsbAWDLCHSJnITSFpVudjtcKl7R9ntzafhs46FeTkH:8Q8SZ2qdD8gqITyGdhcKtntufhspFeTI
Static task
static1
Behavioral task
behavioral1
Sample
92267196fa2f6bb7e991368392ab91dbf501389dad24b1caa0857136fe7eb891.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
92267196fa2f6bb7e991368392ab91dbf501389dad24b1caa0857136fe7eb891
-
Size
705KB
-
MD5
14b9ba711aad97153250fc151b84242b
-
SHA1
bfea2fbb85c3c0c766a2f267841ca41274853e63
-
SHA256
92267196fa2f6bb7e991368392ab91dbf501389dad24b1caa0857136fe7eb891
-
SHA512
0e48a1dec6d644c8cc64660db65816711febed32011cfd54b7de9998650bc78d066c9542b92d5f8f9015329f62c29573644dc6bfe76a08683faf37a7c1f9e4ae
-
SSDEEP
12288:8Q8/I5IsZj2qAcsbAWDLCHSJnITSFpVudjtcKl7R9ntzafhs46FeTkH:8Q8SZ2qdD8gqITyGdhcKtntufhspFeTI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-