General
-
Target
e6d5bf364b16ad587da7ad9531ca5f55f2445e49b09626944e36867275cd3829
-
Size
683KB
-
Sample
230328-hwcarshe57
-
MD5
38b15fe9e3b91d234e7700a5f539ea6d
-
SHA1
69b433d352315ce5907ab084f2efbe619982606d
-
SHA256
e6d5bf364b16ad587da7ad9531ca5f55f2445e49b09626944e36867275cd3829
-
SHA512
004391f0b7687cdc35d22acbb5f2000ef4d4df73b41026d919c355b53d255c17541e0c9a5d7915d29f35e34b8e791db39e3266919d47ac9497d93053221f67d6
-
SSDEEP
12288:XMrEy90FFNbxoTT2c77WVD490BNOwrv8xob9T4wWLEa7PYwBq:7yiFNbCTqcGVs9LtxG98colk
Static task
static1
Behavioral task
behavioral1
Sample
e6d5bf364b16ad587da7ad9531ca5f55f2445e49b09626944e36867275cd3829.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
e6d5bf364b16ad587da7ad9531ca5f55f2445e49b09626944e36867275cd3829
-
Size
683KB
-
MD5
38b15fe9e3b91d234e7700a5f539ea6d
-
SHA1
69b433d352315ce5907ab084f2efbe619982606d
-
SHA256
e6d5bf364b16ad587da7ad9531ca5f55f2445e49b09626944e36867275cd3829
-
SHA512
004391f0b7687cdc35d22acbb5f2000ef4d4df73b41026d919c355b53d255c17541e0c9a5d7915d29f35e34b8e791db39e3266919d47ac9497d93053221f67d6
-
SSDEEP
12288:XMrEy90FFNbxoTT2c77WVD490BNOwrv8xob9T4wWLEa7PYwBq:7yiFNbCTqcGVs9LtxG98colk
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-