General
-
Target
c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70
-
Size
695KB
-
Sample
230327-yg7fcsha31
-
MD5
07cdbf97a992dccbc58200bb3167d55a
-
SHA1
2118f80cdab97d143da4484a63af72b32fa0f460
-
SHA256
c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70
-
SHA512
93b5b61746ef0701076bc9f185a7d99343ce5a5926ff61b3ef01b0dceec591df76cde20ad74d9e893efd56df9963cc636977e1fa53a2da91c01116c7deb0175c
-
SSDEEP
12288:AMrOy90D2MLM9Xj+Rb1nD33csmkUBUAAoit5NDEuM6cziVIJ1tEhqjrKCMdJ6So:+yjMO2bNcVvUpt5NDyXiuFEnCMdJ6n
Static task
static1
Behavioral task
behavioral1
Sample
c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70
-
Size
695KB
-
MD5
07cdbf97a992dccbc58200bb3167d55a
-
SHA1
2118f80cdab97d143da4484a63af72b32fa0f460
-
SHA256
c1031a3f9d2b38503858c38730ba7b8dcab80a871fa106f13af0bd0d25439d70
-
SHA512
93b5b61746ef0701076bc9f185a7d99343ce5a5926ff61b3ef01b0dceec591df76cde20ad74d9e893efd56df9963cc636977e1fa53a2da91c01116c7deb0175c
-
SSDEEP
12288:AMrOy90D2MLM9Xj+Rb1nD33csmkUBUAAoit5NDEuM6cziVIJ1tEhqjrKCMdJ6So:+yjMO2bNcVvUpt5NDyXiuFEnCMdJ6n
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-