General
-
Target
717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1
-
Size
689KB
-
Sample
230328-camaysgd35
-
MD5
5465949c610da7a6dffcb181a30108c7
-
SHA1
349e7e5f066439e47e532ae8cfa94c2d21c3c32a
-
SHA256
717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1
-
SHA512
cb9583c836e3ebdeb300099863a888f653294b19fda65c733e6d76589d915d60b78f50b5b62a7bc67d693733979bb51c3601a39f7679ffc657bae15fc8f52f89
-
SSDEEP
12288:AMr+y90G9Ju/IQox4fgZiyS65hLu4kDq0MSKI3Vq/d0K6LgquXvmFDyfig4A5/Ls:OyD9YQQou4ZvBfaY0LZ3Vq/uDLCXiDya
Static task
static1
Behavioral task
behavioral1
Sample
717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1
-
Size
689KB
-
MD5
5465949c610da7a6dffcb181a30108c7
-
SHA1
349e7e5f066439e47e532ae8cfa94c2d21c3c32a
-
SHA256
717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1
-
SHA512
cb9583c836e3ebdeb300099863a888f653294b19fda65c733e6d76589d915d60b78f50b5b62a7bc67d693733979bb51c3601a39f7679ffc657bae15fc8f52f89
-
SSDEEP
12288:AMr+y90G9Ju/IQox4fgZiyS65hLu4kDq0MSKI3Vq/d0K6LgquXvmFDyfig4A5/Ls:OyD9YQQou4ZvBfaY0LZ3Vq/uDLCXiDya
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-