General
-
Target
13324e2d31d88cea1131b8d302ecd0b0.exe
-
Size
705KB
-
Sample
230327-zkaq8sfb86
-
MD5
13324e2d31d88cea1131b8d302ecd0b0
-
SHA1
1fb2f9884c4921ef6e6db1ae10783c8f4c1781dd
-
SHA256
470675f8f629c37bb9fb67e5248b2e612f7779258e54e4665b054a69914b7ffe
-
SHA512
db49cc6e68f84f9758f024d8e5cbe7c2a4e779185d167da22257cc2d86c7a3a4394624c6d226b431cb4df5d2256bef9daf14550388555a6a8c0e59a5d82e75da
-
SSDEEP
12288:Ze42StnJqYU2E8wGHAoYuYvX2M8tA2NLLMcWKdAo:Ze4tMY9EMHAS5lkKdAo
Static task
static1
Behavioral task
behavioral1
Sample
13324e2d31d88cea1131b8d302ecd0b0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
13324e2d31d88cea1131b8d302ecd0b0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
13324e2d31d88cea1131b8d302ecd0b0.exe
-
Size
705KB
-
MD5
13324e2d31d88cea1131b8d302ecd0b0
-
SHA1
1fb2f9884c4921ef6e6db1ae10783c8f4c1781dd
-
SHA256
470675f8f629c37bb9fb67e5248b2e612f7779258e54e4665b054a69914b7ffe
-
SHA512
db49cc6e68f84f9758f024d8e5cbe7c2a4e779185d167da22257cc2d86c7a3a4394624c6d226b431cb4df5d2256bef9daf14550388555a6a8c0e59a5d82e75da
-
SSDEEP
12288:Ze42StnJqYU2E8wGHAoYuYvX2M8tA2NLLMcWKdAo:Ze4tMY9EMHAS5lkKdAo
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-