General
-
Target
70502e523e5b546e1972aa8bbc86f58652c530541c9c0704d3093556731f89ff
-
Size
695KB
-
Sample
230327-vpmt5sed86
-
MD5
c1b2b61238435acf01afadfbecf7532f
-
SHA1
7ad3737d6090c3588ba76025013ba2234b5dbbc1
-
SHA256
70502e523e5b546e1972aa8bbc86f58652c530541c9c0704d3093556731f89ff
-
SHA512
fb920acf0c1e9218b0631520a9ac28899cda72a20a29d2289d9fec73ca979fcc87f7b7bbb867c63b80b52d401252a848fa1dbebbb0a46fef64e171ad7bc9c862
-
SSDEEP
12288:vMr4y90s+TrFOgXf/qOZHOr6EIGxvuBgkY0V7nhGHjRMxkR9ttf:fy3+fFXXXDur6EIGcgYlhGdvf
Static task
static1
Behavioral task
behavioral1
Sample
70502e523e5b546e1972aa8bbc86f58652c530541c9c0704d3093556731f89ff.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
70502e523e5b546e1972aa8bbc86f58652c530541c9c0704d3093556731f89ff
-
Size
695KB
-
MD5
c1b2b61238435acf01afadfbecf7532f
-
SHA1
7ad3737d6090c3588ba76025013ba2234b5dbbc1
-
SHA256
70502e523e5b546e1972aa8bbc86f58652c530541c9c0704d3093556731f89ff
-
SHA512
fb920acf0c1e9218b0631520a9ac28899cda72a20a29d2289d9fec73ca979fcc87f7b7bbb867c63b80b52d401252a848fa1dbebbb0a46fef64e171ad7bc9c862
-
SSDEEP
12288:vMr4y90s+TrFOgXf/qOZHOr6EIGxvuBgkY0V7nhGHjRMxkR9ttf:fy3+fFXXXDur6EIGcgYlhGdvf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-