General
-
Target
333242a4e8cd7272200932b37fc74b83c0b96e9d6e095311998919c4d3662688
-
Size
690KB
-
Sample
230328-df3qkaae4v
-
MD5
c560088e93c75fa01ff0ab74ff98c40a
-
SHA1
935f7a8c4a1ee562cf8af634dd19e37266e5aaf9
-
SHA256
333242a4e8cd7272200932b37fc74b83c0b96e9d6e095311998919c4d3662688
-
SHA512
966c73b20647c71ead3426c66267c5efc3df76df68d1d10bc132498334bcb84ab218ecc882058ea3b73e0e74656e5d864294707fac5cce7d435ee2b90c67996c
-
SSDEEP
12288:rMr0y90RtLjEnOQkPyo65hLu6fgL8B8vBF5jfig+/3AL0af:Xy8t0nVHfa6fcS8z5jagKALbf
Static task
static1
Behavioral task
behavioral1
Sample
333242a4e8cd7272200932b37fc74b83c0b96e9d6e095311998919c4d3662688.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
333242a4e8cd7272200932b37fc74b83c0b96e9d6e095311998919c4d3662688
-
Size
690KB
-
MD5
c560088e93c75fa01ff0ab74ff98c40a
-
SHA1
935f7a8c4a1ee562cf8af634dd19e37266e5aaf9
-
SHA256
333242a4e8cd7272200932b37fc74b83c0b96e9d6e095311998919c4d3662688
-
SHA512
966c73b20647c71ead3426c66267c5efc3df76df68d1d10bc132498334bcb84ab218ecc882058ea3b73e0e74656e5d864294707fac5cce7d435ee2b90c67996c
-
SSDEEP
12288:rMr0y90RtLjEnOQkPyo65hLu6fgL8B8vBF5jfig+/3AL0af:Xy8t0nVHfa6fcS8z5jagKALbf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-