General
-
Target
ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096
-
Size
700KB
-
Sample
230328-aghj8shh2s
-
MD5
534dd6d182950f2c33dd6a4b95c8ba5f
-
SHA1
49537e779c94e07b73b3df96e5ae25537e78ee8b
-
SHA256
ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096
-
SHA512
b2e223bf3666eccb230e44b754afd7fa4ded0a1107e5d49c202be1c149d3d261bffd2d3bb4f707b9a8113ca8e7ca725e43e57a89c44cc5e0c971f62b260af334
-
SSDEEP
12288:kMrly905HCX5MgCcaisl2LA9D/scAQDNTqKadHM7PHB2+V7Zdwc:hywH4PaiSEcqTi7pFfec
Static task
static1
Behavioral task
behavioral1
Sample
ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096
-
Size
700KB
-
MD5
534dd6d182950f2c33dd6a4b95c8ba5f
-
SHA1
49537e779c94e07b73b3df96e5ae25537e78ee8b
-
SHA256
ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096
-
SHA512
b2e223bf3666eccb230e44b754afd7fa4ded0a1107e5d49c202be1c149d3d261bffd2d3bb4f707b9a8113ca8e7ca725e43e57a89c44cc5e0c971f62b260af334
-
SSDEEP
12288:kMrly905HCX5MgCcaisl2LA9D/scAQDNTqKadHM7PHB2+V7Zdwc:hywH4PaiSEcqTi7pFfec
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-