General
-
Target
c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92
-
Size
695KB
-
Sample
230327-y5ep9ahb41
-
MD5
9949a89ddfe8e005beac43bb66cfd65b
-
SHA1
b870a218401ca88b004a2c99e38642c9727168c3
-
SHA256
c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92
-
SHA512
323f6fa07917b8002b3956da26eb8f45ee203c2b0306e0f098e212bcc5403062ecc45d0c7cb6d3929868712b5c29e01c639f361ffe4826c13aab12cf20ffa25f
-
SSDEEP
12288:yMrNy90Qc7kJ278CKoY9940BFFxMylsQ2lWYbEzVhtJ0aEDnJlHI:PyA7kaPKT2OFxMylsQezsVjylTJ9I
Static task
static1
Behavioral task
behavioral1
Sample
c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92
-
Size
695KB
-
MD5
9949a89ddfe8e005beac43bb66cfd65b
-
SHA1
b870a218401ca88b004a2c99e38642c9727168c3
-
SHA256
c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92
-
SHA512
323f6fa07917b8002b3956da26eb8f45ee203c2b0306e0f098e212bcc5403062ecc45d0c7cb6d3929868712b5c29e01c639f361ffe4826c13aab12cf20ffa25f
-
SSDEEP
12288:yMrNy90Qc7kJ278CKoY9940BFFxMylsQ2lWYbEzVhtJ0aEDnJlHI:PyA7kaPKT2OFxMylsQezsVjylTJ9I
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-