General
-
Target
5e6d6e65e881541775b035a7eddaa56ba84a961b52b7606b8c9e5461405c25d2
-
Size
695KB
-
Sample
230327-wf31fagf4x
-
MD5
ada20aa5ea32e2db4209c7426cd55f05
-
SHA1
75c6d287ea767c588a12e52f27de90f8662fdebe
-
SHA256
5e6d6e65e881541775b035a7eddaa56ba84a961b52b7606b8c9e5461405c25d2
-
SHA512
c9b95b8bbdf999d28e3cb577cd692bf480df354b4a06c448932ddd77f83fd603ec3ea9e8cb7cd039864b9edfe35494d7aed237f38766b89ab3196261a46bf0e0
-
SSDEEP
12288:pMrFy90snkTy+NmrcsLS9wHKs1uaG/o2dCJdnh7RjRMx0bIpgo:Yy4crcseDb/o2dCfh7T1In
Static task
static1
Behavioral task
behavioral1
Sample
5e6d6e65e881541775b035a7eddaa56ba84a961b52b7606b8c9e5461405c25d2.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
5e6d6e65e881541775b035a7eddaa56ba84a961b52b7606b8c9e5461405c25d2
-
Size
695KB
-
MD5
ada20aa5ea32e2db4209c7426cd55f05
-
SHA1
75c6d287ea767c588a12e52f27de90f8662fdebe
-
SHA256
5e6d6e65e881541775b035a7eddaa56ba84a961b52b7606b8c9e5461405c25d2
-
SHA512
c9b95b8bbdf999d28e3cb577cd692bf480df354b4a06c448932ddd77f83fd603ec3ea9e8cb7cd039864b9edfe35494d7aed237f38766b89ab3196261a46bf0e0
-
SSDEEP
12288:pMrFy90snkTy+NmrcsLS9wHKs1uaG/o2dCJdnh7RjRMx0bIpgo:Yy4crcseDb/o2dCfh7T1In
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-