General
-
Target
0910ace8bd777840f9b753dc22432f29c182bf77ee80388b407cc332ca0c053b
-
Size
689KB
-
Sample
230328-e33vhsgh87
-
MD5
4f410274a7f415332071328f83f8a063
-
SHA1
f4e832cb5b3f7804f84d33585a5ba04374a41deb
-
SHA256
0910ace8bd777840f9b753dc22432f29c182bf77ee80388b407cc332ca0c053b
-
SHA512
9ca12695c1209d4e962c239fe534aa2d159808b24611cb941ae0b8dc69ff516382db709bac0b62180c228b5bf09abd6d7cea0c576f90ee5eb47f0d0d9660dbd3
-
SSDEEP
12288:IMrcy90AhIZUpWBkkiG1zyW65hLuyK3/uSBRwUw3fOcAJmJ6vNFyEfigDMAz/Ntg:Ey/eGkVw9fayKvuoRwUw2cQmJ6vyEag0
Static task
static1
Behavioral task
behavioral1
Sample
0910ace8bd777840f9b753dc22432f29c182bf77ee80388b407cc332ca0c053b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
0910ace8bd777840f9b753dc22432f29c182bf77ee80388b407cc332ca0c053b
-
Size
689KB
-
MD5
4f410274a7f415332071328f83f8a063
-
SHA1
f4e832cb5b3f7804f84d33585a5ba04374a41deb
-
SHA256
0910ace8bd777840f9b753dc22432f29c182bf77ee80388b407cc332ca0c053b
-
SHA512
9ca12695c1209d4e962c239fe534aa2d159808b24611cb941ae0b8dc69ff516382db709bac0b62180c228b5bf09abd6d7cea0c576f90ee5eb47f0d0d9660dbd3
-
SSDEEP
12288:IMrcy90AhIZUpWBkkiG1zyW65hLuyK3/uSBRwUw3fOcAJmJ6vNFyEfigDMAz/Ntg:Ey/eGkVw9fayKvuoRwUw2cQmJ6vyEag0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-