General
-
Target
a4a234c51122265a1fd4e08c17c8d18ddbac4b7cd9524c0f7804513bcae6d473
-
Size
694KB
-
Sample
230328-gegngsah9t
-
MD5
f7e8068aae41d81072ff34806a68bc04
-
SHA1
4908e6f896ad332e1be47939e4a085e3b9dc90fd
-
SHA256
a4a234c51122265a1fd4e08c17c8d18ddbac4b7cd9524c0f7804513bcae6d473
-
SHA512
792bd1c89a8afdf5c142e3b7bbbb3674206f5f6f78699d89663dc258847f3fc863ad44b8ab4a07f78e50916a70554ca541bb6437599267f3c3882fc7e85a7368
-
SSDEEP
12288:+t0qsEAq3kh0snRy24PG5fgCo//RccvbiOpIWaEx7rOJZo+d+pOpB:NTPq0hpnUleChFDdp9aS7rOJ2G+EH
Static task
static1
Behavioral task
behavioral1
Sample
a4a234c51122265a1fd4e08c17c8d18ddbac4b7cd9524c0f7804513bcae6d473.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
a4a234c51122265a1fd4e08c17c8d18ddbac4b7cd9524c0f7804513bcae6d473
-
Size
694KB
-
MD5
f7e8068aae41d81072ff34806a68bc04
-
SHA1
4908e6f896ad332e1be47939e4a085e3b9dc90fd
-
SHA256
a4a234c51122265a1fd4e08c17c8d18ddbac4b7cd9524c0f7804513bcae6d473
-
SHA512
792bd1c89a8afdf5c142e3b7bbbb3674206f5f6f78699d89663dc258847f3fc863ad44b8ab4a07f78e50916a70554ca541bb6437599267f3c3882fc7e85a7368
-
SSDEEP
12288:+t0qsEAq3kh0snRy24PG5fgCo//RccvbiOpIWaEx7rOJZo+d+pOpB:NTPq0hpnUleChFDdp9aS7rOJ2G+EH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-