General
-
Target
d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da
-
Size
689KB
-
Sample
230328-bjv4saaa5y
-
MD5
26c5c0abbce77ef0afa5f1776e4fda96
-
SHA1
8b3fad5eef0b9c5528350a89c9b539aad3e693a5
-
SHA256
d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da
-
SHA512
6cd7bd971e732eeffcefbf62e49efb2badd6296fe5797e7f1fb5921f2f7942fcc6efb1cc57620677ea320374a1df7bb932930a6c316487d81370cc98925ad892
-
SSDEEP
12288:dMr2y90O0aneuTkGrelLb14vD5K5Hr8eyVH+FT7mJbvGFLZfigs/3l4qjT15M:/ydveuiL0kL0VHiPmJbyLZaglqjZq
Static task
static1
Behavioral task
behavioral1
Sample
d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da
-
Size
689KB
-
MD5
26c5c0abbce77ef0afa5f1776e4fda96
-
SHA1
8b3fad5eef0b9c5528350a89c9b539aad3e693a5
-
SHA256
d9dd4edb5956587c514c662e022225f7101e1c250f48623ea71ac9b0585ae5da
-
SHA512
6cd7bd971e732eeffcefbf62e49efb2badd6296fe5797e7f1fb5921f2f7942fcc6efb1cc57620677ea320374a1df7bb932930a6c316487d81370cc98925ad892
-
SSDEEP
12288:dMr2y90O0aneuTkGrelLb14vD5K5Hr8eyVH+FT7mJbvGFLZfigs/3l4qjT15M:/ydveuiL0kL0VHiPmJbyLZaglqjZq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-