General
-
Target
ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74
-
Size
695KB
-
Sample
230327-zj244ahc2s
-
MD5
399dac108b9fd8da34f8579cd6521bb9
-
SHA1
6b5bfda81085869f3fa761691abe4dded2100209
-
SHA256
ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74
-
SHA512
8573cab7778d498eb08c03db8b79c5ced4ee27e713ab6efc2799f4500f323dda027fdfe78f97fa0593e17d71e39b59c49ffa5b54c7c90db062dd55e8f829dc49
-
SSDEEP
12288:kMrvy90V5ibYrqBJpolQkkjRHkcvDtEaSf7MRNZDA1B1/t1zq5MJmHHmxsHheTmI:TyvcGsPWRE0xyMpAxt1qWQGxo0iI
Static task
static1
Behavioral task
behavioral1
Sample
ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74
-
Size
695KB
-
MD5
399dac108b9fd8da34f8579cd6521bb9
-
SHA1
6b5bfda81085869f3fa761691abe4dded2100209
-
SHA256
ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74
-
SHA512
8573cab7778d498eb08c03db8b79c5ced4ee27e713ab6efc2799f4500f323dda027fdfe78f97fa0593e17d71e39b59c49ffa5b54c7c90db062dd55e8f829dc49
-
SSDEEP
12288:kMrvy90V5ibYrqBJpolQkkjRHkcvDtEaSf7MRNZDA1B1/t1zq5MJmHHmxsHheTmI:TyvcGsPWRE0xyMpAxt1qWQGxo0iI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-