General
-
Target
2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de
-
Size
695KB
-
Sample
230327-webjssef33
-
MD5
2896126e9b5fa8a56a7fd82969724b12
-
SHA1
6e125840b82311a58902db64f2657186b4bf8e16
-
SHA256
2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de
-
SHA512
5990b68ecc4c445bdc2f81ea372c6ab91d1af0ab170fdc6441df06bc3b0997c7fd67fdfe78988b8fed59609c9870acc98ca2f14c79dd95cff923bc981339af5b
-
SSDEEP
12288:9Mrfy90E16dlJGNXegHFJawsAfqU7fi1WTCeGtKoaanh25Qs6dIazO+meWgr:Oy31QlEtegHfceN7IeyZaAh25Qs0ATgr
Static task
static1
Behavioral task
behavioral1
Sample
2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de
-
Size
695KB
-
MD5
2896126e9b5fa8a56a7fd82969724b12
-
SHA1
6e125840b82311a58902db64f2657186b4bf8e16
-
SHA256
2c903f17bee96eccffac321854c5d9ea1cd0b6ae7f82bbe7138df6dc50a755de
-
SHA512
5990b68ecc4c445bdc2f81ea372c6ab91d1af0ab170fdc6441df06bc3b0997c7fd67fdfe78988b8fed59609c9870acc98ca2f14c79dd95cff923bc981339af5b
-
SSDEEP
12288:9Mrfy90E16dlJGNXegHFJawsAfqU7fi1WTCeGtKoaanh25Qs6dIazO+meWgr:Oy31QlEtegHfceN7IeyZaAh25Qs0ATgr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-