General
-
Target
1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211
-
Size
675KB
-
Sample
230327-wkj35agf51
-
MD5
c940ccb63a9e82b872adf97bb9f00e46
-
SHA1
9429bd1525eac2a7ebd3083dbf75dfba06e1e7d1
-
SHA256
1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211
-
SHA512
0d3fcd872b25b5d177d61c4cf991bd74816fbb43c36fc3ab4feaa238c7c32e48fedd3f937fa90069c7ef8575590bb15685ca71cf3250bd747e82e484d1fdf785
-
SSDEEP
12288:8Mrky90VfWt9ofEZ0Yk8izrY/63EIUQcKt2Z/rGwOEJUKkZlQDYcyZ:Iy6f64EZ0x8ivYCiQXurG/nlQDWZ
Static task
static1
Behavioral task
behavioral1
Sample
1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211
-
Size
675KB
-
MD5
c940ccb63a9e82b872adf97bb9f00e46
-
SHA1
9429bd1525eac2a7ebd3083dbf75dfba06e1e7d1
-
SHA256
1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211
-
SHA512
0d3fcd872b25b5d177d61c4cf991bd74816fbb43c36fc3ab4feaa238c7c32e48fedd3f937fa90069c7ef8575590bb15685ca71cf3250bd747e82e484d1fdf785
-
SSDEEP
12288:8Mrky90VfWt9ofEZ0Yk8izrY/63EIUQcKt2Z/rGwOEJUKkZlQDYcyZ:Iy6f64EZ0x8ivYCiQXurG/nlQDWZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-