General
-
Target
3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee
-
Size
695KB
-
Sample
230327-ym477aha6x
-
MD5
dba39baff2d6e1a64e9a45aeb0fefdb3
-
SHA1
a11e71f7eb96db80dca943a7b8fcebf79115ba6d
-
SHA256
3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee
-
SHA512
d1b6ab79d6ed93ee93ad6ad63a9dc28d8ea14caf43c4205a7f48d83a555c8a18f1c4742f96b932646f87f333d319611470f647153ca71fc17c647397bf549901
-
SSDEEP
12288:OMr3y90YJSPmW2Q8bTBCoPkgFlvqeZSvPSzzi2GJSyryWih:JyTHwUkgvvqeZSyfiHw+yP
Static task
static1
Behavioral task
behavioral1
Sample
3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee
-
Size
695KB
-
MD5
dba39baff2d6e1a64e9a45aeb0fefdb3
-
SHA1
a11e71f7eb96db80dca943a7b8fcebf79115ba6d
-
SHA256
3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee
-
SHA512
d1b6ab79d6ed93ee93ad6ad63a9dc28d8ea14caf43c4205a7f48d83a555c8a18f1c4742f96b932646f87f333d319611470f647153ca71fc17c647397bf549901
-
SSDEEP
12288:OMr3y90YJSPmW2Q8bTBCoPkgFlvqeZSvPSzzi2GJSyryWih:JyTHwUkgvvqeZSyfiHw+yP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-