General
-
Target
91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441
-
Size
700KB
-
Sample
230327-w1kplagg5v
-
MD5
00115cd14159ea81f10a7cecce3cc851
-
SHA1
49a82228887494053337c913a3e9a3ad35f1478f
-
SHA256
91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441
-
SHA512
41530a728a6519355d63fd5dd845a3d185fcb90b86f268a682a247edc671bcbb44e43ad694d5daece3868fc3aea5f2e0f72fac89b69a76bbf63ce15d77cc4a01
-
SSDEEP
12288:sMrzy90ejgGykXwrrvwQzLOKDew0khrM2NwPaSLPHEycA:fyZcIOzzLdDew0MrM2NAaoPHiA
Static task
static1
Behavioral task
behavioral1
Sample
91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441
-
Size
700KB
-
MD5
00115cd14159ea81f10a7cecce3cc851
-
SHA1
49a82228887494053337c913a3e9a3ad35f1478f
-
SHA256
91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441
-
SHA512
41530a728a6519355d63fd5dd845a3d185fcb90b86f268a682a247edc671bcbb44e43ad694d5daece3868fc3aea5f2e0f72fac89b69a76bbf63ce15d77cc4a01
-
SSDEEP
12288:sMrzy90ejgGykXwrrvwQzLOKDew0khrM2NwPaSLPHEycA:fyZcIOzzLdDew0MrM2NAaoPHiA
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-