General
-
Target
4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3
-
Size
686KB
-
Sample
230328-h4af5she86
-
MD5
435f3c10535cc1b2ee46a66c07ab92d8
-
SHA1
75a763f5e6dc32ba6595ad661426f11340b35347
-
SHA256
4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3
-
SHA512
8f57b18657a3ba29827f72ce179106e4b84d934d0c9f988bce7045885287a2616f1f7c257961ae44062c80c57cc135f06e277a1d2df58818c3aa0d29e1cd3413
-
SSDEEP
12288:9Mrxy90l5lKjrLCgddadqOGH6yjCB+R50FJMhLCslUMJuXixJN5vDea/:0yY5lMldIzGBjC450bgLCQhuXENh/
Static task
static1
Behavioral task
behavioral1
Sample
4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3
-
Size
686KB
-
MD5
435f3c10535cc1b2ee46a66c07ab92d8
-
SHA1
75a763f5e6dc32ba6595ad661426f11340b35347
-
SHA256
4e1f98336450ec17fd17e976a942d49ba3ef40b1c8fae5ab4af923b9dfcf6ad3
-
SHA512
8f57b18657a3ba29827f72ce179106e4b84d934d0c9f988bce7045885287a2616f1f7c257961ae44062c80c57cc135f06e277a1d2df58818c3aa0d29e1cd3413
-
SSDEEP
12288:9Mrxy90l5lKjrLCgddadqOGH6yjCB+R50FJMhLCslUMJuXixJN5vDea/:0yY5lMldIzGBjC450bgLCQhuXENh/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-