General
-
Target
92bfb93d33bd04592b497463f01720131d6ba3359f7a4eff0eaf39449783a159
-
Size
699KB
-
Sample
230327-2evkkaff53
-
MD5
b522ef555d453dd30e677ce7260d1b29
-
SHA1
01985586771d4540727c0afddb5974956a01b491
-
SHA256
92bfb93d33bd04592b497463f01720131d6ba3359f7a4eff0eaf39449783a159
-
SHA512
e8df93a92105ff5eace35fb674ebdbd2683dfb9d0e61cde7166d5563791fbe13a0f9c10fc2e28e01a7fe5cb7cc6f5885a7c0f890b3cc9c7d920456f95abf603e
-
SSDEEP
12288:uMrJy90hxYEwtqipxvOQOE/Gm3NNhunA2H1Z5Mj7sfOXA1ZFH:fyCx2XpFOW/GENSA2VbMHsuCn
Static task
static1
Behavioral task
behavioral1
Sample
92bfb93d33bd04592b497463f01720131d6ba3359f7a4eff0eaf39449783a159.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
92bfb93d33bd04592b497463f01720131d6ba3359f7a4eff0eaf39449783a159
-
Size
699KB
-
MD5
b522ef555d453dd30e677ce7260d1b29
-
SHA1
01985586771d4540727c0afddb5974956a01b491
-
SHA256
92bfb93d33bd04592b497463f01720131d6ba3359f7a4eff0eaf39449783a159
-
SHA512
e8df93a92105ff5eace35fb674ebdbd2683dfb9d0e61cde7166d5563791fbe13a0f9c10fc2e28e01a7fe5cb7cc6f5885a7c0f890b3cc9c7d920456f95abf603e
-
SSDEEP
12288:uMrJy90hxYEwtqipxvOQOE/Gm3NNhunA2H1Z5Mj7sfOXA1ZFH:fyCx2XpFOW/GENSA2VbMHsuCn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-