General
-
Target
e289012b84f755ea827cb29ae2e9951643c09f06f0f33a2ae8abcf29d3459d69
-
Size
700KB
-
Sample
230327-wspzcaef68
-
MD5
41acc3686738265f33c685e6108e42bc
-
SHA1
d06788b1e8295dd5594ecad9cfadd2d2f1c0a4ae
-
SHA256
e289012b84f755ea827cb29ae2e9951643c09f06f0f33a2ae8abcf29d3459d69
-
SHA512
9d48227af7e3d56e284f3e4a925bdeb2aaf7e8fb9479ce68d5f719551af78df3bc8ce2440bfa84dfb5960076993b55fe02e698bab5b22cb240d59a140e129f48
-
SSDEEP
12288:4Mr7y90xauQ/EkVBJkiwRyZ/K1hqeCW6KHnNwPVCLpMFF4Jxk3uTaiVL:DynJEmXfwAZ/K1DHnNAV4pMFF4JoCPN
Static task
static1
Behavioral task
behavioral1
Sample
e289012b84f755ea827cb29ae2e9951643c09f06f0f33a2ae8abcf29d3459d69.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
e289012b84f755ea827cb29ae2e9951643c09f06f0f33a2ae8abcf29d3459d69
-
Size
700KB
-
MD5
41acc3686738265f33c685e6108e42bc
-
SHA1
d06788b1e8295dd5594ecad9cfadd2d2f1c0a4ae
-
SHA256
e289012b84f755ea827cb29ae2e9951643c09f06f0f33a2ae8abcf29d3459d69
-
SHA512
9d48227af7e3d56e284f3e4a925bdeb2aaf7e8fb9479ce68d5f719551af78df3bc8ce2440bfa84dfb5960076993b55fe02e698bab5b22cb240d59a140e129f48
-
SSDEEP
12288:4Mr7y90xauQ/EkVBJkiwRyZ/K1hqeCW6KHnNwPVCLpMFF4Jxk3uTaiVL:DynJEmXfwAZ/K1DHnNAV4pMFF4JoCPN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-