General
-
Target
1a55ceebc680ab1962a8ebc20831cd5a6ab90c20da2b79518995a0285fb48b89
-
Size
699KB
-
Sample
230327-wtppzagg2y
-
MD5
50cbafa870911ea0a75cb9a2d38db6d6
-
SHA1
aaf59edd1911ed2628d6db4cb44faea4a50d88e8
-
SHA256
1a55ceebc680ab1962a8ebc20831cd5a6ab90c20da2b79518995a0285fb48b89
-
SHA512
eec683c180de96e41eb07d7bc897c2b2f4dec3c645cbfeb21df46ed1c89c040737370b1117a924193ce8948f5e89136d3cc35dc326651f2f8c58df0fcff59588
-
SSDEEP
12288:PMrLy90SUmo2UsQJicBUOyre0suO6ekI4btrMYNwPSmL+r2Z0qKsrfCdbsWC:MyJSsQ4O1Vu3ldbtrMYNASU9KsIxC
Static task
static1
Behavioral task
behavioral1
Sample
1a55ceebc680ab1962a8ebc20831cd5a6ab90c20da2b79518995a0285fb48b89.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
1a55ceebc680ab1962a8ebc20831cd5a6ab90c20da2b79518995a0285fb48b89
-
Size
699KB
-
MD5
50cbafa870911ea0a75cb9a2d38db6d6
-
SHA1
aaf59edd1911ed2628d6db4cb44faea4a50d88e8
-
SHA256
1a55ceebc680ab1962a8ebc20831cd5a6ab90c20da2b79518995a0285fb48b89
-
SHA512
eec683c180de96e41eb07d7bc897c2b2f4dec3c645cbfeb21df46ed1c89c040737370b1117a924193ce8948f5e89136d3cc35dc326651f2f8c58df0fcff59588
-
SSDEEP
12288:PMrLy90SUmo2UsQJicBUOyre0suO6ekI4btrMYNwPSmL+r2Z0qKsrfCdbsWC:MyJSsQ4O1Vu3ldbtrMYNASU9KsIxC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-