General
-
Target
50a763e4402f9dd7350e18bbe2c8b840c15b4e397039ddd74706a73ebf78407a
-
Size
689KB
-
Sample
230328-fjwgrsha49
-
MD5
f6e19696dfa49236aa35f340dd337455
-
SHA1
764b4501402f10d5550eb095acc862a49a9e6a5c
-
SHA256
50a763e4402f9dd7350e18bbe2c8b840c15b4e397039ddd74706a73ebf78407a
-
SHA512
b6f47ed049cd8b9a3a1c5100e5594d014b509fda73c873ea55526633aaabd4392759d4c09406e0743e0ae907d10102e9084f989f7fba86aa4880dc37c20a7454
-
SSDEEP
12288:yMrHy90MOqb+ab5bQU8yX65hLujGTLqLf9PIvFFelfig9J5zZ2CTC:Jy2qKK9KfajGTm1wHelagtZpTC
Static task
static1
Behavioral task
behavioral1
Sample
50a763e4402f9dd7350e18bbe2c8b840c15b4e397039ddd74706a73ebf78407a.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
50a763e4402f9dd7350e18bbe2c8b840c15b4e397039ddd74706a73ebf78407a
-
Size
689KB
-
MD5
f6e19696dfa49236aa35f340dd337455
-
SHA1
764b4501402f10d5550eb095acc862a49a9e6a5c
-
SHA256
50a763e4402f9dd7350e18bbe2c8b840c15b4e397039ddd74706a73ebf78407a
-
SHA512
b6f47ed049cd8b9a3a1c5100e5594d014b509fda73c873ea55526633aaabd4392759d4c09406e0743e0ae907d10102e9084f989f7fba86aa4880dc37c20a7454
-
SSDEEP
12288:yMrHy90MOqb+ab5bQU8yX65hLujGTLqLf9PIvFFelfig9J5zZ2CTC:Jy2qKK9KfajGTm1wHelagtZpTC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-