General
-
Target
d52f596a088484c5d4ce01b687245afae5787b9858979c2ba03e577b60fccf37
-
Size
713KB
-
Sample
230328-ghmznshb72
-
MD5
407bec8aff220ee044b10de2aca39774
-
SHA1
b60f23a8fdb0fa5a72e4cd9aefd34e1eea337694
-
SHA256
d52f596a088484c5d4ce01b687245afae5787b9858979c2ba03e577b60fccf37
-
SHA512
f37775e2ac54450404f5361f38c54aa60bf37cad41c00d7e4cd4d99371017be0f547cac35be50005d2361a1a84f62bf915cdb04ad79378878d65b2babe83e0ed
-
SSDEEP
12288:sMruy90xmzDcw8dDehXs30Ld7Z9lIZADK3bQlUJ6KtcQv79/nfigMsTYN4yTy:ayfDR2ehXskJ7Leb0lUHbJ/nagMaYFTy
Static task
static1
Behavioral task
behavioral1
Sample
d52f596a088484c5d4ce01b687245afae5787b9858979c2ba03e577b60fccf37.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
d52f596a088484c5d4ce01b687245afae5787b9858979c2ba03e577b60fccf37
-
Size
713KB
-
MD5
407bec8aff220ee044b10de2aca39774
-
SHA1
b60f23a8fdb0fa5a72e4cd9aefd34e1eea337694
-
SHA256
d52f596a088484c5d4ce01b687245afae5787b9858979c2ba03e577b60fccf37
-
SHA512
f37775e2ac54450404f5361f38c54aa60bf37cad41c00d7e4cd4d99371017be0f547cac35be50005d2361a1a84f62bf915cdb04ad79378878d65b2babe83e0ed
-
SSDEEP
12288:sMruy90xmzDcw8dDehXs30Ld7Z9lIZADK3bQlUJ6KtcQv79/nfigMsTYN4yTy:ayfDR2ehXskJ7Leb0lUHbJ/nagMaYFTy
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-