General
-
Target
2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33
-
Size
695KB
-
Sample
230327-xh3m5aeg97
-
MD5
b5ae6515a92e70e42568d5a7278eee84
-
SHA1
f4d7ba423b295629943d1c69e5f62b44887efd59
-
SHA256
2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33
-
SHA512
84e90229fcaf71589a83b0ff73dee6b56a2fa7e45afe2b657dc2d8093fad465658b00d89ad1a3d22d00ec123d0998c1dd0754ffae9638578b78c59381b77ee17
-
SSDEEP
12288:7Mrzy90LMO98LTvteRYrkVkRjaOEoaIET3ZEAQzF1WJkwwrmkYhY627xW:cy2MO983vtqmmjOAIu3ZEAIFskrmk2Ye
Static task
static1
Behavioral task
behavioral1
Sample
2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33
-
Size
695KB
-
MD5
b5ae6515a92e70e42568d5a7278eee84
-
SHA1
f4d7ba423b295629943d1c69e5f62b44887efd59
-
SHA256
2cb2e22c322d369668d1b47653b1f1609c26d7cf25064bc674c0fa9ee2558c33
-
SHA512
84e90229fcaf71589a83b0ff73dee6b56a2fa7e45afe2b657dc2d8093fad465658b00d89ad1a3d22d00ec123d0998c1dd0754ffae9638578b78c59381b77ee17
-
SSDEEP
12288:7Mrzy90LMO98LTvteRYrkVkRjaOEoaIET3ZEAQzF1WJkwwrmkYhY627xW:cy2MO983vtqmmjOAIu3ZEAIFskrmk2Ye
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-