General
-
Target
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb
-
Size
695KB
-
Sample
230327-v816waee85
-
MD5
dcfc28fb6f8f3e8d0fd6b60545dd604e
-
SHA1
3985172c5d4aa1c144ffa99368e8bd094288e7bf
-
SHA256
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb
-
SHA512
f25deace2208265e6c217bb9a314ce280843adba7e83cf95e98799a877e6d8d1cad9c5226e8a1a80e1e05315cdc595ad3bb22d3a7bc82bd980657042ee0bc3f4
-
SSDEEP
12288:aMrLy90CFi3I0YtKI4/iurTP0tg2OD0ojQ6uNvT59nh7jQs6XIhZ70H:RyHFiDtP0itwojVuNvbh7jQsaG70H
Static task
static1
Behavioral task
behavioral1
Sample
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb
-
Size
695KB
-
MD5
dcfc28fb6f8f3e8d0fd6b60545dd604e
-
SHA1
3985172c5d4aa1c144ffa99368e8bd094288e7bf
-
SHA256
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb
-
SHA512
f25deace2208265e6c217bb9a314ce280843adba7e83cf95e98799a877e6d8d1cad9c5226e8a1a80e1e05315cdc595ad3bb22d3a7bc82bd980657042ee0bc3f4
-
SSDEEP
12288:aMrLy90CFi3I0YtKI4/iurTP0tg2OD0ojQ6uNvT59nh7jQs6XIhZ70H:RyHFiDtP0itwojVuNvbh7jQsaG70H
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-