General
-
Target
83a13fc4442f6c6a76d65628e0eccee124c372929cbaccb0231471dc82af6c96
-
Size
700KB
-
Sample
230327-3f1zeafg96
-
MD5
04c098695916c21264e3377bc2a57c95
-
SHA1
6133baa395fdc5758357d24b9143a66665c8d9f2
-
SHA256
83a13fc4442f6c6a76d65628e0eccee124c372929cbaccb0231471dc82af6c96
-
SHA512
a1e63d49289ab9265a9dfab2797a1215fab5eeac7baa4a6333ddd1e01a2ab04ca32acdadcc3ce85425f0eba2c8819767d6151ae501867adb36e25b5ca51a214f
-
SSDEEP
12288:5Mr9y90us83SIm4pZbMMn9D/DcAn/E8F/zX7q6UuoAS2z5FozQjk6K:cyhCIm4bM8hzW6UuRzvof
Static task
static1
Behavioral task
behavioral1
Sample
83a13fc4442f6c6a76d65628e0eccee124c372929cbaccb0231471dc82af6c96.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
83a13fc4442f6c6a76d65628e0eccee124c372929cbaccb0231471dc82af6c96
-
Size
700KB
-
MD5
04c098695916c21264e3377bc2a57c95
-
SHA1
6133baa395fdc5758357d24b9143a66665c8d9f2
-
SHA256
83a13fc4442f6c6a76d65628e0eccee124c372929cbaccb0231471dc82af6c96
-
SHA512
a1e63d49289ab9265a9dfab2797a1215fab5eeac7baa4a6333ddd1e01a2ab04ca32acdadcc3ce85425f0eba2c8819767d6151ae501867adb36e25b5ca51a214f
-
SSDEEP
12288:5Mr9y90us83SIm4pZbMMn9D/DcAn/E8F/zX7q6UuoAS2z5FozQjk6K:cyhCIm4bM8hzW6UuRzvof
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-