General
-
Target
29982700b23482b378d6966449e650559a363b78dcc131d45e04133636d8a685
-
Size
683KB
-
Sample
230328-h2l26abc91
-
MD5
064552ad083df6de65ad9178298cb9ff
-
SHA1
162f67497fe0b999ee6ae407fbbf5ed738d680c1
-
SHA256
29982700b23482b378d6966449e650559a363b78dcc131d45e04133636d8a685
-
SHA512
6707e771f29c159ed5bb0b7382b909333e13bfc0dc928141c9823fa91fc16748a118d2bdb7aa45801bddda9364ee712386e27eb805543e92d2bd98682c1fae31
-
SSDEEP
12288:OMrLy90Z7jnWcUcOSwRRb7AgMLgyYdiPBrfhU+imLx3Z6Y:BygHW0OSwDELgYP/gmLxJd
Static task
static1
Behavioral task
behavioral1
Sample
29982700b23482b378d6966449e650559a363b78dcc131d45e04133636d8a685.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
29982700b23482b378d6966449e650559a363b78dcc131d45e04133636d8a685
-
Size
683KB
-
MD5
064552ad083df6de65ad9178298cb9ff
-
SHA1
162f67497fe0b999ee6ae407fbbf5ed738d680c1
-
SHA256
29982700b23482b378d6966449e650559a363b78dcc131d45e04133636d8a685
-
SHA512
6707e771f29c159ed5bb0b7382b909333e13bfc0dc928141c9823fa91fc16748a118d2bdb7aa45801bddda9364ee712386e27eb805543e92d2bd98682c1fae31
-
SSDEEP
12288:OMrLy90Z7jnWcUcOSwRRb7AgMLgyYdiPBrfhU+imLx3Z6Y:BygHW0OSwDELgYP/gmLxJd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-