General
-
Target
e395dac4da26fb29d4bb312804b8a4a3eed5c6b5d0085f5daed9dba73bf020d7
-
Size
700KB
-
Sample
230327-3hsqtafh24
-
MD5
6f3585da4a9543b64f9eb579d58f6870
-
SHA1
b7def1e4c6d2ebeea5a48bc541ed45cdb8cb12cb
-
SHA256
e395dac4da26fb29d4bb312804b8a4a3eed5c6b5d0085f5daed9dba73bf020d7
-
SHA512
91914f6c12d4625c601f7469ff8d13d514a868ef4f540213e7a84e7eee0ae35a385023c292da4d31312fcc6eb809c154d343ad8e31f98d3be1a2d7f9838ce2f5
-
SSDEEP
12288:QMr5y90eEWEB17CYU9DAMcACNIfNTQ3C2qX4JFywP7azru0y:5yGEffZLspGby
Static task
static1
Behavioral task
behavioral1
Sample
e395dac4da26fb29d4bb312804b8a4a3eed5c6b5d0085f5daed9dba73bf020d7.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
e395dac4da26fb29d4bb312804b8a4a3eed5c6b5d0085f5daed9dba73bf020d7
-
Size
700KB
-
MD5
6f3585da4a9543b64f9eb579d58f6870
-
SHA1
b7def1e4c6d2ebeea5a48bc541ed45cdb8cb12cb
-
SHA256
e395dac4da26fb29d4bb312804b8a4a3eed5c6b5d0085f5daed9dba73bf020d7
-
SHA512
91914f6c12d4625c601f7469ff8d13d514a868ef4f540213e7a84e7eee0ae35a385023c292da4d31312fcc6eb809c154d343ad8e31f98d3be1a2d7f9838ce2f5
-
SSDEEP
12288:QMr5y90eEWEB17CYU9DAMcACNIfNTQ3C2qX4JFywP7azru0y:5yGEffZLspGby
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-