General
-
Target
0fe3a116cb8a3d0b067896f634c6ae959c6a4e43e45855d5aa3f8de425d7ea72
-
Size
695KB
-
Sample
230327-vnsc8sed83
-
MD5
661d8125e85a0fc32626d822a2605ab4
-
SHA1
e15e7ccf63d8a055b164f770f2b99e9b67ed6792
-
SHA256
0fe3a116cb8a3d0b067896f634c6ae959c6a4e43e45855d5aa3f8de425d7ea72
-
SHA512
665d265a7bccfd5b280fb2b8a32924b6358275e32440495f0994a34d1f906fca45931f67b857d486b06243a4e06027b21d8c6dbdfc4851bd1c22432b054e922a
-
SSDEEP
12288:RMrry903vnHtpBRULZf+YeAUq9ocDXKNAvIDRnhK2Qs6yIlKf4IJb:WyKvnHuw7JN8amADBhK2QsvRt
Static task
static1
Behavioral task
behavioral1
Sample
0fe3a116cb8a3d0b067896f634c6ae959c6a4e43e45855d5aa3f8de425d7ea72.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
0fe3a116cb8a3d0b067896f634c6ae959c6a4e43e45855d5aa3f8de425d7ea72
-
Size
695KB
-
MD5
661d8125e85a0fc32626d822a2605ab4
-
SHA1
e15e7ccf63d8a055b164f770f2b99e9b67ed6792
-
SHA256
0fe3a116cb8a3d0b067896f634c6ae959c6a4e43e45855d5aa3f8de425d7ea72
-
SHA512
665d265a7bccfd5b280fb2b8a32924b6358275e32440495f0994a34d1f906fca45931f67b857d486b06243a4e06027b21d8c6dbdfc4851bd1c22432b054e922a
-
SSDEEP
12288:RMrry903vnHtpBRULZf+YeAUq9ocDXKNAvIDRnhK2Qs6yIlKf4IJb:WyKvnHuw7JN8amADBhK2QsvRt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-