General
-
Target
bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88
-
Size
696KB
-
Sample
230327-xkaecseh22
-
MD5
7052a49f3a3a914eae32f9144525dfc0
-
SHA1
b8441dca7e35c277db6ca296e192c070b4ec3e65
-
SHA256
bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88
-
SHA512
e0e919c37d715f44e0b24d8148a2fdcd4358d19ff40b374793bcdff7402634d543ef5bfbd3765670f60b779f70d0270d048d8a11cc3e1efc79850a67c8ea158b
-
SSDEEP
12288:2MrQy90FIGq8uYH7WlqN27J9cKaunlWAnJkCdgoxyzpbGJ4/P+a:Wyyq4bPNabcKaGl5B9YpKgP+a
Static task
static1
Behavioral task
behavioral1
Sample
bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88
-
Size
696KB
-
MD5
7052a49f3a3a914eae32f9144525dfc0
-
SHA1
b8441dca7e35c277db6ca296e192c070b4ec3e65
-
SHA256
bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88
-
SHA512
e0e919c37d715f44e0b24d8148a2fdcd4358d19ff40b374793bcdff7402634d543ef5bfbd3765670f60b779f70d0270d048d8a11cc3e1efc79850a67c8ea158b
-
SSDEEP
12288:2MrQy90FIGq8uYH7WlqN27J9cKaunlWAnJkCdgoxyzpbGJ4/P+a:Wyyq4bPNabcKaGl5B9YpKgP+a
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-