General
-
Target
8565599f5b0a1116e27d91eef13fa6b80f18b54acd33d980bf932d0a99f5ac54
-
Size
690KB
-
Sample
230328-bkvjmsaa6s
-
MD5
0bbe5f3fae01b4cad81f3d3663514b9c
-
SHA1
3ff8d1d3f2aa63321d152e3ef4012a6b30c9cbb3
-
SHA256
8565599f5b0a1116e27d91eef13fa6b80f18b54acd33d980bf932d0a99f5ac54
-
SHA512
b3689cb7351f4c6fbd757a8bce7b65b1d32921524791e8da03bd45826b28a570c48ec643432ced66e10d07543536139f3b5376387f853368ca749fba80434fba
-
SSDEEP
12288:LMrGy90V2jBw4kHhZyxdpNELyV65hLudz5uK3Wb2eWbo7xUYvOFrOfigSMA/0j+K:NyEBgxdpNjIfadQKe2X4yYKrOagSUyK
Static task
static1
Behavioral task
behavioral1
Sample
8565599f5b0a1116e27d91eef13fa6b80f18b54acd33d980bf932d0a99f5ac54.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
8565599f5b0a1116e27d91eef13fa6b80f18b54acd33d980bf932d0a99f5ac54
-
Size
690KB
-
MD5
0bbe5f3fae01b4cad81f3d3663514b9c
-
SHA1
3ff8d1d3f2aa63321d152e3ef4012a6b30c9cbb3
-
SHA256
8565599f5b0a1116e27d91eef13fa6b80f18b54acd33d980bf932d0a99f5ac54
-
SHA512
b3689cb7351f4c6fbd757a8bce7b65b1d32921524791e8da03bd45826b28a570c48ec643432ced66e10d07543536139f3b5376387f853368ca749fba80434fba
-
SSDEEP
12288:LMrGy90V2jBw4kHhZyxdpNELyV65hLudz5uK3Wb2eWbo7xUYvOFrOfigSMA/0j+K:NyEBgxdpNjIfadQKe2X4yYKrOagSUyK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-