General
-
Target
2e2c7d12ed2568f0ed1eef166c06cc62.exe
-
Size
689KB
-
Sample
230328-bacwvagb32
-
MD5
2e2c7d12ed2568f0ed1eef166c06cc62
-
SHA1
6cb1c13586f01d1550126015df22838b80ad5138
-
SHA256
bbf72aab1b599c033a800301c088e7934d560034f1c5327f4f4fc1957d840745
-
SHA512
c7b0d06103784d0fbf8c06a394b37dcba1654891e96f6a08987fb2d1e1981d1435baabae45e2ed76b404cb38979bb2675f20b4a8993a8b214ad6c2bb3c2b6569
-
SSDEEP
12288:9GwUX0PE9LEv2jYWT9BY4DvfOkRTJDfXR0cMQ18gJl24dAIrO:9G70PWrjYG9e4zvDhRGgr24d1O
Static task
static1
Behavioral task
behavioral1
Sample
2e2c7d12ed2568f0ed1eef166c06cc62.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2e2c7d12ed2568f0ed1eef166c06cc62.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
2e2c7d12ed2568f0ed1eef166c06cc62.exe
-
Size
689KB
-
MD5
2e2c7d12ed2568f0ed1eef166c06cc62
-
SHA1
6cb1c13586f01d1550126015df22838b80ad5138
-
SHA256
bbf72aab1b599c033a800301c088e7934d560034f1c5327f4f4fc1957d840745
-
SHA512
c7b0d06103784d0fbf8c06a394b37dcba1654891e96f6a08987fb2d1e1981d1435baabae45e2ed76b404cb38979bb2675f20b4a8993a8b214ad6c2bb3c2b6569
-
SSDEEP
12288:9GwUX0PE9LEv2jYWT9BY4DvfOkRTJDfXR0cMQ18gJl24dAIrO:9G70PWrjYG9e4zvDhRGgr24d1O
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-