General
-
Target
4687849f5e5e415f378c1888d9c04d6e0cb2af1bac94bf9351fd74c0f9743b64
-
Size
690KB
-
Sample
230328-c4s1lagf32
-
MD5
2e267c8437c56bd564df2facaac58c5b
-
SHA1
7e6e41692a021b8eed8aa0fdc1ab253dd52039f6
-
SHA256
4687849f5e5e415f378c1888d9c04d6e0cb2af1bac94bf9351fd74c0f9743b64
-
SHA512
259f6703899a5185080fb8ae927bb90ec2e4bc788aafda21895e096b6d4aa26ef4ec430d95979569271d534bf901aecfe8d99b5b14241861abaab7f71901aae8
-
SSDEEP
12288:xMrqy90U7BzLhXye65hLuJSn2MSKE363QsNHKvIFngfighKXFSHdfwN:TyIFfaJ42Lt36gkKQngag1KN
Static task
static1
Behavioral task
behavioral1
Sample
4687849f5e5e415f378c1888d9c04d6e0cb2af1bac94bf9351fd74c0f9743b64.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
4687849f5e5e415f378c1888d9c04d6e0cb2af1bac94bf9351fd74c0f9743b64
-
Size
690KB
-
MD5
2e267c8437c56bd564df2facaac58c5b
-
SHA1
7e6e41692a021b8eed8aa0fdc1ab253dd52039f6
-
SHA256
4687849f5e5e415f378c1888d9c04d6e0cb2af1bac94bf9351fd74c0f9743b64
-
SHA512
259f6703899a5185080fb8ae927bb90ec2e4bc788aafda21895e096b6d4aa26ef4ec430d95979569271d534bf901aecfe8d99b5b14241861abaab7f71901aae8
-
SSDEEP
12288:xMrqy90U7BzLhXye65hLuJSn2MSKE363QsNHKvIFngfighKXFSHdfwN:TyIFfaJ42Lt36gkKQngag1KN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-