General
-
Target
832c7b4977951dd48f323b03b8761712dbc9a1dc0d67b85508c6ebb24a5c7815
-
Size
690KB
-
Sample
230328-a83z9ahh9z
-
MD5
8aa1d94b74a86eaa809756ca4d3863be
-
SHA1
2b6ee59b8ce62ec6147d84a4de3cc22ca9255f31
-
SHA256
832c7b4977951dd48f323b03b8761712dbc9a1dc0d67b85508c6ebb24a5c7815
-
SHA512
438c21694b576f9f7cee59d9610ee71394db5843af7b699627ccb392cf751d517ac28ac631b1099fd424337c8ed29b44a6f523b3c2696a2fca8deffcc704e3c1
-
SSDEEP
12288:TMrgy90stdF3CpFVA054Lk5Oqdq3KYmnFxp837RkLpRsq8e+81CNB:XyfXQA05r5Dqizp837Rk8q8eb1QB
Static task
static1
Behavioral task
behavioral1
Sample
832c7b4977951dd48f323b03b8761712dbc9a1dc0d67b85508c6ebb24a5c7815.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
832c7b4977951dd48f323b03b8761712dbc9a1dc0d67b85508c6ebb24a5c7815
-
Size
690KB
-
MD5
8aa1d94b74a86eaa809756ca4d3863be
-
SHA1
2b6ee59b8ce62ec6147d84a4de3cc22ca9255f31
-
SHA256
832c7b4977951dd48f323b03b8761712dbc9a1dc0d67b85508c6ebb24a5c7815
-
SHA512
438c21694b576f9f7cee59d9610ee71394db5843af7b699627ccb392cf751d517ac28ac631b1099fd424337c8ed29b44a6f523b3c2696a2fca8deffcc704e3c1
-
SSDEEP
12288:TMrgy90stdF3CpFVA054Lk5Oqdq3KYmnFxp837RkLpRsq8e+81CNB:XyfXQA05r5Dqizp837Rk8q8eb1QB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-