General
-
Target
e303a7dbcc1dce6b01cccfa9f5336bd8a429ff433efed401dcb400197ffc0a92
-
Size
689KB
-
Sample
230328-bf3dpagb65
-
MD5
9eb6b607fa7c57e1a4ce70f7c1dfec1c
-
SHA1
ca1e785fc9502bd70f5703845fd61fcff6d075d3
-
SHA256
e303a7dbcc1dce6b01cccfa9f5336bd8a429ff433efed401dcb400197ffc0a92
-
SHA512
1b4a078aa09ba6f8ce961d57e3f03d60e066758e67d9b8aad8a92c8aeb90d6955c5eabbc8f369eae44748f652a72316656d7db044c4452d7ce35a23276961913
-
SSDEEP
12288:NMray90LDLvnfD7GjfPWuKsvYyb65hLuch2qP7Ohi/jllsaBv1wmJ9vOFW0figt4:fywDbGbPW2ZGfaLIOhssaBymJ9aW0agq
Static task
static1
Behavioral task
behavioral1
Sample
e303a7dbcc1dce6b01cccfa9f5336bd8a429ff433efed401dcb400197ffc0a92.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
e303a7dbcc1dce6b01cccfa9f5336bd8a429ff433efed401dcb400197ffc0a92
-
Size
689KB
-
MD5
9eb6b607fa7c57e1a4ce70f7c1dfec1c
-
SHA1
ca1e785fc9502bd70f5703845fd61fcff6d075d3
-
SHA256
e303a7dbcc1dce6b01cccfa9f5336bd8a429ff433efed401dcb400197ffc0a92
-
SHA512
1b4a078aa09ba6f8ce961d57e3f03d60e066758e67d9b8aad8a92c8aeb90d6955c5eabbc8f369eae44748f652a72316656d7db044c4452d7ce35a23276961913
-
SSDEEP
12288:NMray90LDLvnfD7GjfPWuKsvYyb65hLuch2qP7Ohi/jllsaBv1wmJ9vOFW0figt4:fywDbGbPW2ZGfaLIOhssaBymJ9aW0agq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-