General
-
Target
62907b6b027da98ef1e736777d44363752286ebbb14dc096d8641fc41e7fb9f3
-
Size
695KB
-
Sample
230327-vr5gzage3w
-
MD5
888093fb536e28aff1207ba2ee3470bd
-
SHA1
205142f16b857f4eb7c2216881877fed7af7860e
-
SHA256
62907b6b027da98ef1e736777d44363752286ebbb14dc096d8641fc41e7fb9f3
-
SHA512
673e3ba734fb2f56628ff55429b7b988bdd3e7526200286eeda1e46a4b55212f2124fd8b8eb2d9008ae1be2ad9305ead7cedd434cefd0519247301d60df98591
-
SSDEEP
12288:iMrHy90jkdiOpFQnN3EHECOyj8XAEgq8uan0pJYenhVvQs6uIcooHNz:tyNdxsEbOdwEgEpSshVvQsDv5
Static task
static1
Behavioral task
behavioral1
Sample
62907b6b027da98ef1e736777d44363752286ebbb14dc096d8641fc41e7fb9f3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
62907b6b027da98ef1e736777d44363752286ebbb14dc096d8641fc41e7fb9f3
-
Size
695KB
-
MD5
888093fb536e28aff1207ba2ee3470bd
-
SHA1
205142f16b857f4eb7c2216881877fed7af7860e
-
SHA256
62907b6b027da98ef1e736777d44363752286ebbb14dc096d8641fc41e7fb9f3
-
SHA512
673e3ba734fb2f56628ff55429b7b988bdd3e7526200286eeda1e46a4b55212f2124fd8b8eb2d9008ae1be2ad9305ead7cedd434cefd0519247301d60df98591
-
SSDEEP
12288:iMrHy90jkdiOpFQnN3EHECOyj8XAEgq8uan0pJYenhVvQs6uIcooHNz:tyNdxsEbOdwEgEpSshVvQsDv5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-