General
-
Target
f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b
-
Size
696KB
-
Sample
230327-zhemeahb9s
-
MD5
e3bd04773207081be534b64140172082
-
SHA1
f9d94e31fe10ee049ba4a1f40a3668ba5e5a2b3c
-
SHA256
f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b
-
SHA512
67adddecd3fd97cb8f387f79b05ac9f5ca1027f8be0125373e8ac2ebc4ff9b23239059071ed281fb2460ba97104c61b0d9d0fa7fc7d24b6c5db898479596f229
-
SSDEEP
12288:rMrVy90UEetbiQmUvd2YtYJv3hFvTCsjTYFGEdwDzQsiJL8UkErd:my2eBmUvEYGRjTCsQFGhvQVyUvd
Static task
static1
Behavioral task
behavioral1
Sample
f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b
-
Size
696KB
-
MD5
e3bd04773207081be534b64140172082
-
SHA1
f9d94e31fe10ee049ba4a1f40a3668ba5e5a2b3c
-
SHA256
f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b
-
SHA512
67adddecd3fd97cb8f387f79b05ac9f5ca1027f8be0125373e8ac2ebc4ff9b23239059071ed281fb2460ba97104c61b0d9d0fa7fc7d24b6c5db898479596f229
-
SSDEEP
12288:rMrVy90UEetbiQmUvd2YtYJv3hFvTCsjTYFGEdwDzQsiJL8UkErd:my2eBmUvEYGRjTCsQFGhvQVyUvd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-