General
-
Target
7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d
-
Size
695KB
-
Sample
230327-yawqaagh91
-
MD5
96dec57731dcc86ab9cc353074df62f1
-
SHA1
18773b26c02156677849d9b1e436da18dd4fc421
-
SHA256
7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d
-
SHA512
207d7ef1602422531a5b1a0ff8e3373cd4843fa6102eb0204f3f563ed38bb63bb6ddbed91fff3219a028cb67a729eb8773bc5a4f7043b908dbf53b16dadd21ea
-
SSDEEP
12288:AMrIy90vwSSkDUKGJBZ5/8LCwe/J+lBUzrW8J2w2uY:YyGwD13Z5/aCwegf8rZgX
Static task
static1
Behavioral task
behavioral1
Sample
7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d
-
Size
695KB
-
MD5
96dec57731dcc86ab9cc353074df62f1
-
SHA1
18773b26c02156677849d9b1e436da18dd4fc421
-
SHA256
7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d
-
SHA512
207d7ef1602422531a5b1a0ff8e3373cd4843fa6102eb0204f3f563ed38bb63bb6ddbed91fff3219a028cb67a729eb8773bc5a4f7043b908dbf53b16dadd21ea
-
SSDEEP
12288:AMrIy90vwSSkDUKGJBZ5/8LCwe/J+lBUzrW8J2w2uY:YyGwD13Z5/aCwegf8rZgX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-