General
-
Target
672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14
-
Size
696KB
-
Sample
230327-yzr4dsfa93
-
MD5
418b5ed53ab9315e02c9f1d3e809479e
-
SHA1
201ce1c30233401004ff113c1caece164cf39680
-
SHA256
672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14
-
SHA512
df7137e9cc1e5ff6e82448a3c518f6a4f91044dc52bf5d21e66aa198ac3f6c4a3980c58c6b5358676e6835f6ac883dc2492f5b4b42a730b1e3ded6dab5cfd56a
-
SSDEEP
12288:iMr5y90HD7YGexJsWAF3CwFha1QOLjoZQZ2HKwzM1jJxZ+eFGz:ryW7ghU3nk1QO3hZcKoMh7Z+YQ
Static task
static1
Behavioral task
behavioral1
Sample
672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14
-
Size
696KB
-
MD5
418b5ed53ab9315e02c9f1d3e809479e
-
SHA1
201ce1c30233401004ff113c1caece164cf39680
-
SHA256
672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14
-
SHA512
df7137e9cc1e5ff6e82448a3c518f6a4f91044dc52bf5d21e66aa198ac3f6c4a3980c58c6b5358676e6835f6ac883dc2492f5b4b42a730b1e3ded6dab5cfd56a
-
SSDEEP
12288:iMr5y90HD7YGexJsWAF3CwFha1QOLjoZQZ2HKwzM1jJxZ+eFGz:ryW7ghU3nk1QO3hZcKoMh7Z+YQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-