General
-
Target
7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8
-
Size
700KB
-
Sample
230327-2s6jzsff94
-
MD5
418b8e3f9d85270634310c58bd9d3511
-
SHA1
d275d89cdfafdb24f5c7e8f89ba955a8091cba6d
-
SHA256
7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8
-
SHA512
1f522dd3a23caacd0a668af3e863848ca2cda9c6c8008ef231a24f1088c90cf027046da17b4fccadec75d0ad0d9f865ea1e1b912fa824d95a112bfc4ca8f1fc3
-
SSDEEP
12288:TMr6y90smrMtFrlwFtI9DoNcAEAkNljlVQYPMSSfzUi34ZZv+eec:9yAQPpqPE3jlaYj+GPGeec
Static task
static1
Behavioral task
behavioral1
Sample
7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8
-
Size
700KB
-
MD5
418b8e3f9d85270634310c58bd9d3511
-
SHA1
d275d89cdfafdb24f5c7e8f89ba955a8091cba6d
-
SHA256
7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8
-
SHA512
1f522dd3a23caacd0a668af3e863848ca2cda9c6c8008ef231a24f1088c90cf027046da17b4fccadec75d0ad0d9f865ea1e1b912fa824d95a112bfc4ca8f1fc3
-
SSDEEP
12288:TMr6y90smrMtFrlwFtI9DoNcAEAkNljlVQYPMSSfzUi34ZZv+eec:9yAQPpqPE3jlaYj+GPGeec
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-