General
-
Target
82c95b0fc70d45917aa05cc1f0ab0a97ba0238da932ddc87456b984647f05eff
-
Size
696KB
-
Sample
230328-1l1vgsfc2t
-
MD5
9018962466f785938a67614867cddc6d
-
SHA1
eaeb6288c4120b493bc604bc396d7642076ca690
-
SHA256
82c95b0fc70d45917aa05cc1f0ab0a97ba0238da932ddc87456b984647f05eff
-
SHA512
cd751612f5bb8b72ad04f80fa360f497aa0a77b84093f8f7e76d14a129e67b84c04fb7c157a96d7304ea637da36fd7d54a52b0f3d71d39d8bb3587fb18666312
-
SSDEEP
12288:OMrFy90xpDlW0ZF77aI3NBj9XlAcFDqO69/6+ggwefUTxY/9/LHF/oeec0:Tymxx77Z9Bj9jFDqO6Y+SefUu/pd390
Static task
static1
Behavioral task
behavioral1
Sample
82c95b0fc70d45917aa05cc1f0ab0a97ba0238da932ddc87456b984647f05eff.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Targets
-
-
Target
82c95b0fc70d45917aa05cc1f0ab0a97ba0238da932ddc87456b984647f05eff
-
Size
696KB
-
MD5
9018962466f785938a67614867cddc6d
-
SHA1
eaeb6288c4120b493bc604bc396d7642076ca690
-
SHA256
82c95b0fc70d45917aa05cc1f0ab0a97ba0238da932ddc87456b984647f05eff
-
SHA512
cd751612f5bb8b72ad04f80fa360f497aa0a77b84093f8f7e76d14a129e67b84c04fb7c157a96d7304ea637da36fd7d54a52b0f3d71d39d8bb3587fb18666312
-
SSDEEP
12288:OMrFy90xpDlW0ZF77aI3NBj9XlAcFDqO69/6+ggwefUTxY/9/LHF/oeec0:Tymxx77Z9Bj9jFDqO6Y+SefUu/pd390
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-