General
-
Target
fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf
-
Size
691KB
-
Sample
230328-a6harshh81
-
MD5
4f711e111e6496b8b518d78d068a0f98
-
SHA1
0943d9ce51e4f9ca480d7be3aa911345a424187a
-
SHA256
fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf
-
SHA512
1211a25138b754d5efb98701e17ceea69cee22d204b2e219b68dfe6d95276795dccfe1756b26ed32afa5d9bac51d560a86fca95f331707aa63971fe276f82e1d
-
SSDEEP
12288:CMrgy901EMPjLoR/zZhI0Y9ixQoNtpNzIOtXdNa62X8ADloyP2:OyacVh+4em/oHX8ADlN2
Static task
static1
Behavioral task
behavioral1
Sample
fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf
-
Size
691KB
-
MD5
4f711e111e6496b8b518d78d068a0f98
-
SHA1
0943d9ce51e4f9ca480d7be3aa911345a424187a
-
SHA256
fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf
-
SHA512
1211a25138b754d5efb98701e17ceea69cee22d204b2e219b68dfe6d95276795dccfe1756b26ed32afa5d9bac51d560a86fca95f331707aa63971fe276f82e1d
-
SSDEEP
12288:CMrgy901EMPjLoR/zZhI0Y9ixQoNtpNzIOtXdNa62X8ADloyP2:OyacVh+4em/oHX8ADlN2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-