General
-
Target
54074ea59b5edcf9a9aa289df184530beb273cb6be5415d1fd42d6fd757a15c4
-
Size
682KB
-
Sample
230328-gjc6vsba2t
-
MD5
5134503b3b337cd22485da32a6fe1b45
-
SHA1
34cb7c943a17952a952e0f5b7131030b549967ef
-
SHA256
54074ea59b5edcf9a9aa289df184530beb273cb6be5415d1fd42d6fd757a15c4
-
SHA512
1eecd0e58e6d2adf58766e8a4eeeb4994dbcf6b2f681ce06d5a87fb7934adfa4ea63b00b0b84f17fa5647acee193a7de5b8f8619d34d00b368ff9cf78f333b8c
-
SSDEEP
12288:vMrmy90NzH3EtvHy32Sydn0nNgLF98c/Al42WAs/h2C:hysH3E432SenTh9FAONV
Static task
static1
Behavioral task
behavioral1
Sample
54074ea59b5edcf9a9aa289df184530beb273cb6be5415d1fd42d6fd757a15c4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
54074ea59b5edcf9a9aa289df184530beb273cb6be5415d1fd42d6fd757a15c4
-
Size
682KB
-
MD5
5134503b3b337cd22485da32a6fe1b45
-
SHA1
34cb7c943a17952a952e0f5b7131030b549967ef
-
SHA256
54074ea59b5edcf9a9aa289df184530beb273cb6be5415d1fd42d6fd757a15c4
-
SHA512
1eecd0e58e6d2adf58766e8a4eeeb4994dbcf6b2f681ce06d5a87fb7934adfa4ea63b00b0b84f17fa5647acee193a7de5b8f8619d34d00b368ff9cf78f333b8c
-
SSDEEP
12288:vMrmy90NzH3EtvHy32Sydn0nNgLF98c/Al42WAs/h2C:hysH3E432SenTh9FAONV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-