General
-
Target
7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302
-
Size
696KB
-
Sample
230327-z16hvafc55
-
MD5
d2f2c2b3c76b086e06adc95b7b5c19e4
-
SHA1
c0d62277b2ef94a862c98f6e9ea344bd01e1dfc7
-
SHA256
7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302
-
SHA512
ec9304b39014cbd4530a9d9af29132f8720ecb353b5b6b710d87e46b1e69bea21811e1d9e840547b809200a7a4b31fbcb293176675743bb657b5e7cca94e379e
-
SSDEEP
12288:9Mrdy90OF6wJIFUXedABUtJjLcGuPlh3+L5WD7MNzB36JKHw/9G8qbj:wyNLKFUXe75LcGelhQ5W/WBqQwqbj
Static task
static1
Behavioral task
behavioral1
Sample
7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302
-
Size
696KB
-
MD5
d2f2c2b3c76b086e06adc95b7b5c19e4
-
SHA1
c0d62277b2ef94a862c98f6e9ea344bd01e1dfc7
-
SHA256
7bdfcd904e1dca1031feb664a0d7cf2a58162fbdde2100fa8231dcf7a59a2302
-
SHA512
ec9304b39014cbd4530a9d9af29132f8720ecb353b5b6b710d87e46b1e69bea21811e1d9e840547b809200a7a4b31fbcb293176675743bb657b5e7cca94e379e
-
SSDEEP
12288:9Mrdy90OF6wJIFUXedABUtJjLcGuPlh3+L5WD7MNzB36JKHw/9G8qbj:wyNLKFUXe75LcGelhQ5W/WBqQwqbj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-