General
-
Target
ee87cb92008da554c8ef4bf21ca92fb4ce507fe6ff434bbad5a057ccf6b48290
-
Size
704KB
-
Sample
230327-3xw2safh76
-
MD5
685673cb7af8f2241b8dff0e252cc15a
-
SHA1
6896a6e63e3b799b7ad8e7fca712fd084e591a88
-
SHA256
ee87cb92008da554c8ef4bf21ca92fb4ce507fe6ff434bbad5a057ccf6b48290
-
SHA512
4716c250c2708aac39d31b90188cfe25fa8670417852abad35de3bca5b57404967ce73da0b71edbe190e2197a0989ccb0b6c682d4e33736ceb32eddf6c6a8e07
-
SSDEEP
12288:P4I1uIXAI9mewElrO5A/0cw1OZ7wFcW8ChGtMI+vcFFd:P4IXQ6mewcrXZw1OZ7jWFhGCBkD
Static task
static1
Behavioral task
behavioral1
Sample
ee87cb92008da554c8ef4bf21ca92fb4ce507fe6ff434bbad5a057ccf6b48290.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
ee87cb92008da554c8ef4bf21ca92fb4ce507fe6ff434bbad5a057ccf6b48290
-
Size
704KB
-
MD5
685673cb7af8f2241b8dff0e252cc15a
-
SHA1
6896a6e63e3b799b7ad8e7fca712fd084e591a88
-
SHA256
ee87cb92008da554c8ef4bf21ca92fb4ce507fe6ff434bbad5a057ccf6b48290
-
SHA512
4716c250c2708aac39d31b90188cfe25fa8670417852abad35de3bca5b57404967ce73da0b71edbe190e2197a0989ccb0b6c682d4e33736ceb32eddf6c6a8e07
-
SSDEEP
12288:P4I1uIXAI9mewElrO5A/0cw1OZ7wFcW8ChGtMI+vcFFd:P4IXQ6mewcrXZw1OZ7jWFhGCBkD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-