General
-
Target
55b8f8236d2215682f7579e1fc1bf35bfef9c55bf9aa8fa399e013230a6796bd
-
Size
695KB
-
Sample
230327-x3wejseh75
-
MD5
d3266baa227df1f774ea3a2cc4d305f7
-
SHA1
d7fa4f459dd002c8f93fd44f14ef73ab0101771b
-
SHA256
55b8f8236d2215682f7579e1fc1bf35bfef9c55bf9aa8fa399e013230a6796bd
-
SHA512
a0a98d095e96f9436dfb2625d5be3fe36a7dccf1051b83a60528c8075fc8142d8c66a28ae88c54bc6c04e9e0a42dfbd62eba9d9af5dfb0e5539f0a2d781b2d1d
-
SSDEEP
12288:sMrjy90TBhWU7JvZpC6EgoXPgt/5T/L6qrxd+Ln/sz+dAJ0yjeOU+h1:fyAhWU8H4tReqrxALc+aCyjiC1
Static task
static1
Behavioral task
behavioral1
Sample
55b8f8236d2215682f7579e1fc1bf35bfef9c55bf9aa8fa399e013230a6796bd.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
55b8f8236d2215682f7579e1fc1bf35bfef9c55bf9aa8fa399e013230a6796bd
-
Size
695KB
-
MD5
d3266baa227df1f774ea3a2cc4d305f7
-
SHA1
d7fa4f459dd002c8f93fd44f14ef73ab0101771b
-
SHA256
55b8f8236d2215682f7579e1fc1bf35bfef9c55bf9aa8fa399e013230a6796bd
-
SHA512
a0a98d095e96f9436dfb2625d5be3fe36a7dccf1051b83a60528c8075fc8142d8c66a28ae88c54bc6c04e9e0a42dfbd62eba9d9af5dfb0e5539f0a2d781b2d1d
-
SSDEEP
12288:sMrjy90TBhWU7JvZpC6EgoXPgt/5T/L6qrxd+Ln/sz+dAJ0yjeOU+h1:fyAhWU8H4tReqrxALc+aCyjiC1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-