General
-
Target
ca044281f268ecbc1ca79d6cfe8c7587eb04bbe7ce9a7e23c0082605f19c635c
-
Size
695KB
-
Sample
230327-yx65jafa88
-
MD5
b1173a8058193fa04e9fd1c36146c660
-
SHA1
8ad7cfda39b0ff058ec33fd65ce766bff31197a8
-
SHA256
ca044281f268ecbc1ca79d6cfe8c7587eb04bbe7ce9a7e23c0082605f19c635c
-
SHA512
ccc2673b2edee78c948209428dd12735f838fe82aed6225e72156e88899c41b088a28b950896fc21a2e180dac68c10d1f36394338fb2e832795edfacb0a21cac
-
SSDEEP
12288:3MrNy90k8ciQT/j1Gl3k1UPCl1gCcke95QTlD3pvPS1z4zRJara9i4+XS:Wyz1T7Cb8jhMOpy141g0x+C
Static task
static1
Behavioral task
behavioral1
Sample
ca044281f268ecbc1ca79d6cfe8c7587eb04bbe7ce9a7e23c0082605f19c635c.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
ca044281f268ecbc1ca79d6cfe8c7587eb04bbe7ce9a7e23c0082605f19c635c
-
Size
695KB
-
MD5
b1173a8058193fa04e9fd1c36146c660
-
SHA1
8ad7cfda39b0ff058ec33fd65ce766bff31197a8
-
SHA256
ca044281f268ecbc1ca79d6cfe8c7587eb04bbe7ce9a7e23c0082605f19c635c
-
SHA512
ccc2673b2edee78c948209428dd12735f838fe82aed6225e72156e88899c41b088a28b950896fc21a2e180dac68c10d1f36394338fb2e832795edfacb0a21cac
-
SSDEEP
12288:3MrNy90k8ciQT/j1Gl3k1UPCl1gCcke95QTlD3pvPS1z4zRJara9i4+XS:Wyz1T7Cb8jhMOpy141g0x+C
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-