General
-
Target
65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a
-
Size
700KB
-
Sample
230327-2yey8afg27
-
MD5
0fa69235664dc018f0fb9de085fccfe8
-
SHA1
b611020e7d63b9d62092e30a6384ea312b7be335
-
SHA256
65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a
-
SHA512
426cf0239c706a5dec336002f8103a646c912c794662c4122d8926d12a27bfa656e53179801bdb5cd486206502c93701d60f71e8c550e712afda7c57970dd781
-
SSDEEP
12288:XMrZy903RhyBsV6rS3kPC9DMVcAmPurcOF4Bu/fB97OiVs+WsCyRPtyFAd:yywsBm6rS3cPmPurcOqyfBls+WsCl2
Static task
static1
Behavioral task
behavioral1
Sample
65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a
-
Size
700KB
-
MD5
0fa69235664dc018f0fb9de085fccfe8
-
SHA1
b611020e7d63b9d62092e30a6384ea312b7be335
-
SHA256
65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a
-
SHA512
426cf0239c706a5dec336002f8103a646c912c794662c4122d8926d12a27bfa656e53179801bdb5cd486206502c93701d60f71e8c550e712afda7c57970dd781
-
SSDEEP
12288:XMrZy903RhyBsV6rS3kPC9DMVcAmPurcOF4Bu/fB97OiVs+WsCyRPtyFAd:yywsBm6rS3cPmPurcOqyfBls+WsCl2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-