General
-
Target
setup.exe
-
Size
700KB
-
Sample
230328-a7hb6ahh9t
-
MD5
560438562e86acf69f02aeda2086968b
-
SHA1
96d0dc3fd4d18e54f933109d75ac5807caa1cc77
-
SHA256
8b539d02f4658dc80f89a69e2b355796f48d8d68b6174dff551b4ff29277523c
-
SHA512
0e9047c7ca34da83dde4394846a060988af4c412e3025177775ad3deb5d95cae38a25d3cdbdadc3cc58c083855b87d427670edea6441ffb3bc75c70a6369674a
-
SSDEEP
12288:WMrTy900GpXQD7JDgatv9DGIcA6GNPqO+0/XOAnDOju60hO0xfg:1yBHDVzX6wqE/XO4DOCzg
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
setup.exe
-
Size
700KB
-
MD5
560438562e86acf69f02aeda2086968b
-
SHA1
96d0dc3fd4d18e54f933109d75ac5807caa1cc77
-
SHA256
8b539d02f4658dc80f89a69e2b355796f48d8d68b6174dff551b4ff29277523c
-
SHA512
0e9047c7ca34da83dde4394846a060988af4c412e3025177775ad3deb5d95cae38a25d3cdbdadc3cc58c083855b87d427670edea6441ffb3bc75c70a6369674a
-
SSDEEP
12288:WMrTy900GpXQD7JDgatv9DGIcA6GNPqO+0/XOAnDOju60hO0xfg:1yBHDVzX6wqE/XO4DOCzg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-