General
-
Target
22d19ff01e8ddfec2a584aac9aac8d39bfce610981cc0357b91b31834c82e84b
-
Size
689KB
-
Sample
230328-cgnglagd63
-
MD5
4fde53ea63a554403edb90271c1ef2fd
-
SHA1
1ea0270882dc61358a1edfe3d09f2c710b595ad3
-
SHA256
22d19ff01e8ddfec2a584aac9aac8d39bfce610981cc0357b91b31834c82e84b
-
SHA512
1857ebdc5f0a7faae24c5e461f0dd403abb66e2f4ee2cb4a55b5c83cfd6acc658bea3f61dfe0148d46ed5d4cb855da33834d56f59a99c6f70e4bd98b03801e2d
-
SSDEEP
12288:xMr0y90br+VFG2aggOtcJXYB/LqXi45tXum1vJmJpvIFzbfigg/tCWB9s+:xyC3sc1MeXlX33mJpQzbagXv+
Static task
static1
Behavioral task
behavioral1
Sample
22d19ff01e8ddfec2a584aac9aac8d39bfce610981cc0357b91b31834c82e84b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
22d19ff01e8ddfec2a584aac9aac8d39bfce610981cc0357b91b31834c82e84b
-
Size
689KB
-
MD5
4fde53ea63a554403edb90271c1ef2fd
-
SHA1
1ea0270882dc61358a1edfe3d09f2c710b595ad3
-
SHA256
22d19ff01e8ddfec2a584aac9aac8d39bfce610981cc0357b91b31834c82e84b
-
SHA512
1857ebdc5f0a7faae24c5e461f0dd403abb66e2f4ee2cb4a55b5c83cfd6acc658bea3f61dfe0148d46ed5d4cb855da33834d56f59a99c6f70e4bd98b03801e2d
-
SSDEEP
12288:xMr0y90br+VFG2aggOtcJXYB/LqXi45tXum1vJmJpvIFzbfigg/tCWB9s+:xyC3sc1MeXlX33mJpQzbagXv+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-