General
-
Target
16c3f3fe91e457cfcfa2c9d670eabc9b74adb5de18eee0bc6e9ede7859dfe00e
-
Size
705KB
-
Sample
230327-2lv5nshf3v
-
MD5
e40499de2ca8bcf1c63546d694cfe4b9
-
SHA1
1c1789e8aaa941f8594daa5ccce1c621c421e813
-
SHA256
16c3f3fe91e457cfcfa2c9d670eabc9b74adb5de18eee0bc6e9ede7859dfe00e
-
SHA512
d3a9e15ce878f641e75c8bf83f18ef1ad5d44862aeb4967e8091c6b309ce710b5b0f965ff05942b7c06afa30f3899fab9d28fb06938297c0d97b35f99fc46890
-
SSDEEP
12288:kQ8/I5IsZj2qAcsbAWDLCHSJnITSFpVudjtcKl7R9ntzafhs46FeTkH:kQ8SZ2qdD8gqITyGdhcKtntufhspFeTI
Static task
static1
Behavioral task
behavioral1
Sample
16c3f3fe91e457cfcfa2c9d670eabc9b74adb5de18eee0bc6e9ede7859dfe00e.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
16c3f3fe91e457cfcfa2c9d670eabc9b74adb5de18eee0bc6e9ede7859dfe00e
-
Size
705KB
-
MD5
e40499de2ca8bcf1c63546d694cfe4b9
-
SHA1
1c1789e8aaa941f8594daa5ccce1c621c421e813
-
SHA256
16c3f3fe91e457cfcfa2c9d670eabc9b74adb5de18eee0bc6e9ede7859dfe00e
-
SHA512
d3a9e15ce878f641e75c8bf83f18ef1ad5d44862aeb4967e8091c6b309ce710b5b0f965ff05942b7c06afa30f3899fab9d28fb06938297c0d97b35f99fc46890
-
SSDEEP
12288:kQ8/I5IsZj2qAcsbAWDLCHSJnITSFpVudjtcKl7R9ntzafhs46FeTkH:kQ8SZ2qdD8gqITyGdhcKtntufhspFeTI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-