General
-
Target
842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044
-
Size
690KB
-
Sample
230328-e79tmaag5w
-
MD5
101c9294987ed6ea6d7a7cbe8daa0bdf
-
SHA1
6975b7475d651e7bda25bf665ce9716651dc144e
-
SHA256
842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044
-
SHA512
1c1715804c35d76dac709d787a66ee2f79fb3a97d309e7f4251cb2d1656c3fb26aa55ad939afd3bfab1267ce619dcaf524261d5b002415bce3d80f46c2c43ed8
-
SSDEEP
12288:iMrIy90kw0SdLMqXkuavkPCTk5XmCmsviFfLfig7e+wKTOc/:eyxkLMqXk1vzTeWCufLagalk/
Static task
static1
Behavioral task
behavioral1
Sample
842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044
-
Size
690KB
-
MD5
101c9294987ed6ea6d7a7cbe8daa0bdf
-
SHA1
6975b7475d651e7bda25bf665ce9716651dc144e
-
SHA256
842d638fd762a74244958b9f9ab835e2c06ba7629e665020829e4cdf2d920044
-
SHA512
1c1715804c35d76dac709d787a66ee2f79fb3a97d309e7f4251cb2d1656c3fb26aa55ad939afd3bfab1267ce619dcaf524261d5b002415bce3d80f46c2c43ed8
-
SSDEEP
12288:iMrIy90kw0SdLMqXkuavkPCTk5XmCmsviFfLfig7e+wKTOc/:eyxkLMqXk1vzTeWCufLagalk/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-