General
-
Target
ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465
-
Size
696KB
-
Sample
230327-yv3pbsha9y
-
MD5
c9922b38dddf2d3815af1b655d5cb24e
-
SHA1
47d9e67204afa0f75da59de6d515c75e8d46c680
-
SHA256
ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465
-
SHA512
9bb801848938c24324fd5962b3b1153faaf54ce94fee138d89d65af7f5c492b7b3cc68e7590e5426cb2e83944eae9a7952feccf84df116d5d0d77916d54d6a64
-
SSDEEP
12288:VMrdy90yCM+7cuFcH7gVSa/hJkjaEEHL2Vdl/JzvHRJitEnqqrd6:Qy+I+nVjXEqId9Zvx2EX6
Static task
static1
Behavioral task
behavioral1
Sample
ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465
-
Size
696KB
-
MD5
c9922b38dddf2d3815af1b655d5cb24e
-
SHA1
47d9e67204afa0f75da59de6d515c75e8d46c680
-
SHA256
ede319c36ca8a447f51fe51b1e6c049398ed2a5abc37baa636be2f4064339465
-
SHA512
9bb801848938c24324fd5962b3b1153faaf54ce94fee138d89d65af7f5c492b7b3cc68e7590e5426cb2e83944eae9a7952feccf84df116d5d0d77916d54d6a64
-
SSDEEP
12288:VMrdy90yCM+7cuFcH7gVSa/hJkjaEEHL2Vdl/JzvHRJitEnqqrd6:Qy+I+nVjXEqId9Zvx2EX6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-