General
-
Target
3dcec2c2c876fc877c382374b1b91228f851593365c0622a5c6d50321f8367bb
-
Size
686KB
-
Sample
230328-h5986ahe89
-
MD5
d9f0e8e4cf3b09a8a71059983a672b9d
-
SHA1
687e7c27be822fc24d84c5d8b2c1823f47977a34
-
SHA256
3dcec2c2c876fc877c382374b1b91228f851593365c0622a5c6d50321f8367bb
-
SHA512
984d2e4950c89f23ad03262d8dde3ffe76f20e41884fa8ca4fe9da2d9627503aa482e87e9d147ebcc63476ab311e6fe3b16b99b638819b041bc150961e5dcfa7
-
SSDEEP
12288:FMrsy90RoFyyiimUW/T3Um5XDUTwUuU47uX3lE1VHY2:RyLyyvmZT3X5T9bpuXVEk2
Static task
static1
Behavioral task
behavioral1
Sample
3dcec2c2c876fc877c382374b1b91228f851593365c0622a5c6d50321f8367bb.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
3dcec2c2c876fc877c382374b1b91228f851593365c0622a5c6d50321f8367bb
-
Size
686KB
-
MD5
d9f0e8e4cf3b09a8a71059983a672b9d
-
SHA1
687e7c27be822fc24d84c5d8b2c1823f47977a34
-
SHA256
3dcec2c2c876fc877c382374b1b91228f851593365c0622a5c6d50321f8367bb
-
SHA512
984d2e4950c89f23ad03262d8dde3ffe76f20e41884fa8ca4fe9da2d9627503aa482e87e9d147ebcc63476ab311e6fe3b16b99b638819b041bc150961e5dcfa7
-
SSDEEP
12288:FMrsy90RoFyyiimUW/T3Um5XDUTwUuU47uX3lE1VHY2:RyLyyvmZT3X5T9bpuXVEk2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-