General
-
Target
9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65
-
Size
689KB
-
Sample
230328-b8qwcsgd28
-
MD5
135b6c192bb576da14e79e6ce6bccbdf
-
SHA1
46bff8337b828acdcf29d0f905439d8595be54b6
-
SHA256
9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65
-
SHA512
1863bae42e48a878430116008f91939452853fa0dce6f760f5c648db8901fe78c85a9be2f25cfd427d33a1563dca10480d46ff3d16ada9250516603da1d1bbc9
-
SSDEEP
12288:QMrRy90UpbLPFQjXCvBKct/yA65hLuC2K3auSH45hOesNlOvPF92fig06WKwFS0e:RyXbmjXCvwKa/faC2KKuuOIeqOF92agr
Static task
static1
Behavioral task
behavioral1
Sample
9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65
-
Size
689KB
-
MD5
135b6c192bb576da14e79e6ce6bccbdf
-
SHA1
46bff8337b828acdcf29d0f905439d8595be54b6
-
SHA256
9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65
-
SHA512
1863bae42e48a878430116008f91939452853fa0dce6f760f5c648db8901fe78c85a9be2f25cfd427d33a1563dca10480d46ff3d16ada9250516603da1d1bbc9
-
SSDEEP
12288:QMrRy90UpbLPFQjXCvBKct/yA65hLuC2K3auSH45hOesNlOvPF92fig06WKwFS0e:RyXbmjXCvwKa/faC2KKuuOIeqOF92agr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-