General
-
Target
c83d7298fa50369192e0285779a476a816f2f7535b6c4ef544322c8ac40d6e61
-
Size
689KB
-
Sample
230328-f3c5jahb24
-
MD5
0adf372b487dfaa2eefd067de7e13edd
-
SHA1
e2cca30e276b95ef656dd1ceb4fe9d8d3e5c83a4
-
SHA256
c83d7298fa50369192e0285779a476a816f2f7535b6c4ef544322c8ac40d6e61
-
SHA512
a2cc4f3649e580f6b52d3d09c0b41d76ece820708682287cca2c22c7754a8349eb963c36f63201cbbad9bf060eac9d2c6032c0c220c2791547059823e4e7e238
-
SSDEEP
12288:ZMrey90pomguCF5+ImaU1Zgjy365hLu8dduswrWUj8v5F4YfigZ+WSvIB:DyPnIeeqfamu2UAL4Yagyu
Static task
static1
Behavioral task
behavioral1
Sample
c83d7298fa50369192e0285779a476a816f2f7535b6c4ef544322c8ac40d6e61.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
c83d7298fa50369192e0285779a476a816f2f7535b6c4ef544322c8ac40d6e61
-
Size
689KB
-
MD5
0adf372b487dfaa2eefd067de7e13edd
-
SHA1
e2cca30e276b95ef656dd1ceb4fe9d8d3e5c83a4
-
SHA256
c83d7298fa50369192e0285779a476a816f2f7535b6c4ef544322c8ac40d6e61
-
SHA512
a2cc4f3649e580f6b52d3d09c0b41d76ece820708682287cca2c22c7754a8349eb963c36f63201cbbad9bf060eac9d2c6032c0c220c2791547059823e4e7e238
-
SSDEEP
12288:ZMrey90pomguCF5+ImaU1Zgjy365hLu8dduswrWUj8v5F4YfigZ+WSvIB:DyPnIeeqfamu2UAL4Yagyu
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-