General
-
Target
9a3f328e5fbc44af7ecc4e98cf7260e13189d17e5140b080a0a1ae73bfc1b2af
-
Size
696KB
-
Sample
230328-259geafe3z
-
MD5
928e3fa99ac0ffa0f50680198028d2d7
-
SHA1
15f634b336b0b23c898a25d313fbb96d1fbc79c8
-
SHA256
9a3f328e5fbc44af7ecc4e98cf7260e13189d17e5140b080a0a1ae73bfc1b2af
-
SHA512
c38807532413660f89205660a2d5bc1923fef9e2ed7748e0d84996d67c25c502037211c372df5658d15a4966bb8ba540281bf6ecf57370da76ab4a1adb0dd15a
-
SSDEEP
12288:JMrhy90iLIONt3NBB9GS36Ehzl69/DZ1fvt6QW9OYnlsgghsk:wybLjt9BB9KEhzl6dfF6BnagAsk
Static task
static1
Behavioral task
behavioral1
Sample
9a3f328e5fbc44af7ecc4e98cf7260e13189d17e5140b080a0a1ae73bfc1b2af.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zaza
176.113.115.145:4125
-
auth_value
48bf44c663fe3c1035fb4dd0b91fde5d
Targets
-
-
Target
9a3f328e5fbc44af7ecc4e98cf7260e13189d17e5140b080a0a1ae73bfc1b2af
-
Size
696KB
-
MD5
928e3fa99ac0ffa0f50680198028d2d7
-
SHA1
15f634b336b0b23c898a25d313fbb96d1fbc79c8
-
SHA256
9a3f328e5fbc44af7ecc4e98cf7260e13189d17e5140b080a0a1ae73bfc1b2af
-
SHA512
c38807532413660f89205660a2d5bc1923fef9e2ed7748e0d84996d67c25c502037211c372df5658d15a4966bb8ba540281bf6ecf57370da76ab4a1adb0dd15a
-
SSDEEP
12288:JMrhy90iLIONt3NBB9GS36Ehzl69/DZ1fvt6QW9OYnlsgghsk:wybLjt9BB9KEhzl6dfF6BnagAsk
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-