General
-
Target
172742d918d8d53bec416a129533610b612c8708c74343c7cbc2f5b61d143f23
-
Size
690KB
-
Sample
230328-a9172sgb29
-
MD5
24f0ddfe0332622a82d8fd855402bd05
-
SHA1
7327a5a70cf3abaa5c49c3cca7f778735cec9708
-
SHA256
172742d918d8d53bec416a129533610b612c8708c74343c7cbc2f5b61d143f23
-
SHA512
145bd580fd679e2ff42eb50804b4fe6c3c4af692104b1f6c7c175355c92e48cf58591203107285f36b38ab8b6af4eaab965f0813620074569946719d51a0b51c
-
SSDEEP
12288:UMrWy90xeC0TXladjDo5rtRZn5B0AIP0jv1RkDCyPuYzqeLB:KycjYMdno5rtr5C1PDCGzqel
Static task
static1
Behavioral task
behavioral1
Sample
172742d918d8d53bec416a129533610b612c8708c74343c7cbc2f5b61d143f23.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
172742d918d8d53bec416a129533610b612c8708c74343c7cbc2f5b61d143f23
-
Size
690KB
-
MD5
24f0ddfe0332622a82d8fd855402bd05
-
SHA1
7327a5a70cf3abaa5c49c3cca7f778735cec9708
-
SHA256
172742d918d8d53bec416a129533610b612c8708c74343c7cbc2f5b61d143f23
-
SHA512
145bd580fd679e2ff42eb50804b4fe6c3c4af692104b1f6c7c175355c92e48cf58591203107285f36b38ab8b6af4eaab965f0813620074569946719d51a0b51c
-
SSDEEP
12288:UMrWy90xeC0TXladjDo5rtRZn5B0AIP0jv1RkDCyPuYzqeLB:KycjYMdno5rtr5C1PDCGzqel
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-