General
-
Target
b8159fa35d9bc51373e278fa8d87afbc6ef9d2b761b695b0abaa1db788f66ec1
-
Size
689KB
-
Sample
230328-e25ygsag3w
-
MD5
3cdf3c09a99786fe9a697742bde2429e
-
SHA1
b267d02fc000791c08071118721202a2199e618d
-
SHA256
b8159fa35d9bc51373e278fa8d87afbc6ef9d2b761b695b0abaa1db788f66ec1
-
SHA512
8b57b6b3622fba3a9a54d338a3ec2a76b7526139b3c2af27eac2aff4ef8d3c22343e304c19196c88c1dce673a153b39e549461cace3470911400c544a64c7b26
-
SSDEEP
12288:/MrKy90HLp8klAtpFagyR65hLu1GMSKI3VPoK6LbucvmFpIfig8V0gf1SAONCvHE:py0L6t28fa1GLZ3VPoDLKcSpIag+x4Z
Static task
static1
Behavioral task
behavioral1
Sample
b8159fa35d9bc51373e278fa8d87afbc6ef9d2b761b695b0abaa1db788f66ec1.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
b8159fa35d9bc51373e278fa8d87afbc6ef9d2b761b695b0abaa1db788f66ec1
-
Size
689KB
-
MD5
3cdf3c09a99786fe9a697742bde2429e
-
SHA1
b267d02fc000791c08071118721202a2199e618d
-
SHA256
b8159fa35d9bc51373e278fa8d87afbc6ef9d2b761b695b0abaa1db788f66ec1
-
SHA512
8b57b6b3622fba3a9a54d338a3ec2a76b7526139b3c2af27eac2aff4ef8d3c22343e304c19196c88c1dce673a153b39e549461cace3470911400c544a64c7b26
-
SSDEEP
12288:/MrKy90HLp8klAtpFagyR65hLu1GMSKI3VPoK6LbucvmFpIfig8V0gf1SAONCvHE:py0L6t28fa1GLZ3VPoDLKcSpIag+x4Z
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-