General
-
Target
1c07989d482c86a2d49ba44b55f25049f595c70fab0218cf0c59c842a728f2a8
-
Size
689KB
-
Sample
230328-bv923sgc55
-
MD5
2269976bf22c6efa85a0e3e8fdaa6d96
-
SHA1
6e8099e126f0b397c2a095d871dec5c32685ad91
-
SHA256
1c07989d482c86a2d49ba44b55f25049f595c70fab0218cf0c59c842a728f2a8
-
SHA512
fee51354c6571aeec3646039420d86e79427891aeee35d134416876b5e39c382d6fadf62f58b15ba1eab4b8640a8b75c8e2c808231737320d803bbe14e884f3e
-
SSDEEP
12288:FMrsy90bwtl4mk1hMllNx1yn1IUM9e+DT4Tid2LBU/cajWKmJ+vHF/bfigfjNGk6:Zy+wtam3lNQTj+DTyTU/hNmJ+9/bagJi
Static task
static1
Behavioral task
behavioral1
Sample
1c07989d482c86a2d49ba44b55f25049f595c70fab0218cf0c59c842a728f2a8.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
1c07989d482c86a2d49ba44b55f25049f595c70fab0218cf0c59c842a728f2a8
-
Size
689KB
-
MD5
2269976bf22c6efa85a0e3e8fdaa6d96
-
SHA1
6e8099e126f0b397c2a095d871dec5c32685ad91
-
SHA256
1c07989d482c86a2d49ba44b55f25049f595c70fab0218cf0c59c842a728f2a8
-
SHA512
fee51354c6571aeec3646039420d86e79427891aeee35d134416876b5e39c382d6fadf62f58b15ba1eab4b8640a8b75c8e2c808231737320d803bbe14e884f3e
-
SSDEEP
12288:FMrsy90bwtl4mk1hMllNx1yn1IUM9e+DT4Tid2LBU/cajWKmJ+vHF/bfigfjNGk6:Zy+wtam3lNQTj+DTyTU/hNmJ+9/bagJi
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-