General
-
Target
42cc0f132239675894405dc23aa6619a07452a629075f8ecce98742588bfe4ba
-
Size
694KB
-
Sample
230327-v4j2ssee72
-
MD5
2409e1562f4b77ab52d20b4c0da0c93d
-
SHA1
2a37f390673b92e9089b9ab02f35cfdd04a7275d
-
SHA256
42cc0f132239675894405dc23aa6619a07452a629075f8ecce98742588bfe4ba
-
SHA512
160a275a9873cf38030e867ec96b51068a9f41e8bd573f15c10d9c1dbb865de784292816fb0fd49e7950f7cec3bef98e1334ccf87c88461d5a2ea9c582021a24
-
SSDEEP
12288:3MrPy90fmhJiGamnZzH9Afqg5yUGuqOtHnhOkQs6EIGISTTRun:QyIGaSZL9OH5yChOkQs1DTs
Static task
static1
Behavioral task
behavioral1
Sample
42cc0f132239675894405dc23aa6619a07452a629075f8ecce98742588bfe4ba.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
42cc0f132239675894405dc23aa6619a07452a629075f8ecce98742588bfe4ba
-
Size
694KB
-
MD5
2409e1562f4b77ab52d20b4c0da0c93d
-
SHA1
2a37f390673b92e9089b9ab02f35cfdd04a7275d
-
SHA256
42cc0f132239675894405dc23aa6619a07452a629075f8ecce98742588bfe4ba
-
SHA512
160a275a9873cf38030e867ec96b51068a9f41e8bd573f15c10d9c1dbb865de784292816fb0fd49e7950f7cec3bef98e1334ccf87c88461d5a2ea9c582021a24
-
SSDEEP
12288:3MrPy90fmhJiGamnZzH9Afqg5yUGuqOtHnhOkQs6EIGISTTRun:QyIGaSZL9OH5yChOkQs1DTs
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-