General
-
Target
83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd
-
Size
699KB
-
Sample
230327-2tw2yahf5x
-
MD5
647429c01f43a89170f674f9edfc6f06
-
SHA1
38f608d17bb6cc0d628a600e87bf3ef1e5c898f4
-
SHA256
83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd
-
SHA512
196bea0299cb76d1f6737fdbc1ffe4ac4d09a59a39a82ce5e1c8eca11f7a15048b99f6c88167566c33f1614975e98d8c886d850d0630f798734ab38453069cf3
-
SSDEEP
12288:MMrVy90/YhxnSFEUQw6A79DHicAD0CdOpq6r9GFgxj7dDMKqsH0Al:py8YhpSmvZgCdcvcFsHdDMYh
Static task
static1
Behavioral task
behavioral1
Sample
83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd
-
Size
699KB
-
MD5
647429c01f43a89170f674f9edfc6f06
-
SHA1
38f608d17bb6cc0d628a600e87bf3ef1e5c898f4
-
SHA256
83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd
-
SHA512
196bea0299cb76d1f6737fdbc1ffe4ac4d09a59a39a82ce5e1c8eca11f7a15048b99f6c88167566c33f1614975e98d8c886d850d0630f798734ab38453069cf3
-
SSDEEP
12288:MMrVy90/YhxnSFEUQw6A79DHicAD0CdOpq6r9GFgxj7dDMKqsH0Al:py8YhpSmvZgCdcvcFsHdDMYh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-