General
-
Target
c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0
-
Size
695KB
-
Sample
230327-x4r4hseh77
-
MD5
307f8b9bd6937074b57130acc0d3b38d
-
SHA1
64f756f41857025a0813ad878d7a382e520335f6
-
SHA256
c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0
-
SHA512
a5fe6972c8e21d8111fb0a8ec1cbd51b0cd01bbd49d995d38b8efcbccae14ea9bea7bf95b7ce073a850d881852e5265335e16e55bfc289eb922d55bc0831886e
-
SSDEEP
12288:RMroy90uvhFW+4RogBuwLsRzi8O+avPS0zvxfJ1kX/NINoPr:VyXT6RNkwLwzi8OPycvt4VINoD
Static task
static1
Behavioral task
behavioral1
Sample
c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0
-
Size
695KB
-
MD5
307f8b9bd6937074b57130acc0d3b38d
-
SHA1
64f756f41857025a0813ad878d7a382e520335f6
-
SHA256
c3bc09ca7f306dda59167240348380e83e1ffec57a4dca10a4c110bd552672d0
-
SHA512
a5fe6972c8e21d8111fb0a8ec1cbd51b0cd01bbd49d995d38b8efcbccae14ea9bea7bf95b7ce073a850d881852e5265335e16e55bfc289eb922d55bc0831886e
-
SSDEEP
12288:RMroy90uvhFW+4RogBuwLsRzi8O+avPS0zvxfJ1kX/NINoPr:VyXT6RNkwLwzi8OPycvt4VINoD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-