General
-
Target
86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39
-
Size
691KB
-
Sample
230328-bckdpsaa2y
-
MD5
927b65e902f1fb8adf45febb599694b3
-
SHA1
94d50e3119f01b742d478647cd6e9df49b6558bb
-
SHA256
86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39
-
SHA512
753013fe81933f249c783d48fb160c386cd85381b26fd30795c5c5a404ea26b5c848f1fadc77755d574ce465a0699a49317c364010253265ab5280da3027f554
-
SSDEEP
12288:jMrcy902oigTatj558rGHOJJsyO65hLuVs0MSKI3VHvS0oT0WVzVRCGul:HyfgWT8rDtVfaVs0LZ3VHa0oTNVRCGul
Static task
static1
Behavioral task
behavioral1
Sample
86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39
-
Size
691KB
-
MD5
927b65e902f1fb8adf45febb599694b3
-
SHA1
94d50e3119f01b742d478647cd6e9df49b6558bb
-
SHA256
86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39
-
SHA512
753013fe81933f249c783d48fb160c386cd85381b26fd30795c5c5a404ea26b5c848f1fadc77755d574ce465a0699a49317c364010253265ab5280da3027f554
-
SSDEEP
12288:jMrcy902oigTatj558rGHOJJsyO65hLuVs0MSKI3VHvS0oT0WVzVRCGul:HyfgWT8rDtVfaVs0LZ3VHa0oTNVRCGul
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-