General
-
Target
d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c
-
Size
689KB
-
Sample
230328-bmlphsgc24
-
MD5
c0aceddf89d3ba0abf338d56897a270b
-
SHA1
275feac0c253c8e0f2aa094c032986ae5c12c6e4
-
SHA256
d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c
-
SHA512
3430884e185cfbed7131fbf8a2ec69f7fdca55cc05c667887e6fb4889e507b3cf69f273cf987097df1676de8a9ae444bfa8d9e37b6b57e05ede4e3fdeb98b7af
-
SSDEEP
12288:AMroy90VrD5AlUzU4xaAFWZy065hLuCqMSKx31LamdtoiOcgYivmFq/figuTnljO:YyKhwExyQ7faCqLw31PtoiOaiCq/agcS
Static task
static1
Behavioral task
behavioral1
Sample
d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c
-
Size
689KB
-
MD5
c0aceddf89d3ba0abf338d56897a270b
-
SHA1
275feac0c253c8e0f2aa094c032986ae5c12c6e4
-
SHA256
d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c
-
SHA512
3430884e185cfbed7131fbf8a2ec69f7fdca55cc05c667887e6fb4889e507b3cf69f273cf987097df1676de8a9ae444bfa8d9e37b6b57e05ede4e3fdeb98b7af
-
SSDEEP
12288:AMroy90VrD5AlUzU4xaAFWZy065hLuCqMSKx31LamdtoiOcgYivmFq/figuTnljO:YyKhwExyQ7faCqLw31PtoiOaiCq/agcS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-