General
-
Target
936e182d5114373e2d6608bc528d3e66716655d0177903b37e8dbd912903f83a
-
Size
689KB
-
Sample
230328-cxpplage78
-
MD5
39b0be139665d421001d24d00d7c2000
-
SHA1
8307ce4e21677b52b3b5e05a1dedbaec13e7bb85
-
SHA256
936e182d5114373e2d6608bc528d3e66716655d0177903b37e8dbd912903f83a
-
SHA512
8866edab1af1d8e9565f27caa52f38e9707e28ff7c1bd1d281cb94ff2d5242a344d3c05d4744b014247ddfcd484412b09abda0f8e88269c7c36d57ff5acc56f7
-
SSDEEP
12288:pMr3y90GcXhOVqvuKCTAwSVuy965hLuXAkYAD5fNohmsvnF9tfigg1TVXZoDf:SyV+hOVqxCTQrQfaXAU12d9tag/f
Static task
static1
Behavioral task
behavioral1
Sample
936e182d5114373e2d6608bc528d3e66716655d0177903b37e8dbd912903f83a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
936e182d5114373e2d6608bc528d3e66716655d0177903b37e8dbd912903f83a
-
Size
689KB
-
MD5
39b0be139665d421001d24d00d7c2000
-
SHA1
8307ce4e21677b52b3b5e05a1dedbaec13e7bb85
-
SHA256
936e182d5114373e2d6608bc528d3e66716655d0177903b37e8dbd912903f83a
-
SHA512
8866edab1af1d8e9565f27caa52f38e9707e28ff7c1bd1d281cb94ff2d5242a344d3c05d4744b014247ddfcd484412b09abda0f8e88269c7c36d57ff5acc56f7
-
SSDEEP
12288:pMr3y90GcXhOVqvuKCTAwSVuy965hLuXAkYAD5fNohmsvnF9tfigg1TVXZoDf:SyV+hOVqxCTQrQfaXAU12d9tag/f
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-