General
-
Target
a9c79ba7aecba667a81aab65e3553f3d405099f9ce23f731523f117d1a70f007
-
Size
689KB
-
Sample
230328-f2hzdsha99
-
MD5
8282cd6e388786e0d3f5cfb45b8b6cb5
-
SHA1
81dc6997a7b0de7aeddfbfdb0382f5468d5f3562
-
SHA256
a9c79ba7aecba667a81aab65e3553f3d405099f9ce23f731523f117d1a70f007
-
SHA512
353b9ad095be54c2e6193dce371aa37f00a9ee815ad4b89f372f3096266225cb0d47006cc3ae5aa3dceb4a59de2da43f2addb3b1faa3a027c3d54922fe326e8e
-
SSDEEP
12288:VMrwy90Guj5rP10ikGi9y565hLuBLK3huSvcbmJKv1FGCfig3vWb8onh:Jyit0D0EfaBLKRuqcbmJKXGCag3vWb8W
Static task
static1
Behavioral task
behavioral1
Sample
a9c79ba7aecba667a81aab65e3553f3d405099f9ce23f731523f117d1a70f007.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
a9c79ba7aecba667a81aab65e3553f3d405099f9ce23f731523f117d1a70f007
-
Size
689KB
-
MD5
8282cd6e388786e0d3f5cfb45b8b6cb5
-
SHA1
81dc6997a7b0de7aeddfbfdb0382f5468d5f3562
-
SHA256
a9c79ba7aecba667a81aab65e3553f3d405099f9ce23f731523f117d1a70f007
-
SHA512
353b9ad095be54c2e6193dce371aa37f00a9ee815ad4b89f372f3096266225cb0d47006cc3ae5aa3dceb4a59de2da43f2addb3b1faa3a027c3d54922fe326e8e
-
SSDEEP
12288:VMrwy90Guj5rP10ikGi9y565hLuBLK3huSvcbmJKv1FGCfig3vWb8onh:Jyit0D0EfaBLKRuqcbmJKXGCag3vWb8W
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-