General
-
Target
ac6f78c77c1d1ffb78e51edd19f57487dd0b137feb5602449cf86696ef339048
-
Size
684KB
-
Sample
230328-jhqrnshf55
-
MD5
836986cce54a048c8c29b41e2bc301a9
-
SHA1
89185b727de852f77b123ec96530c2305a9a0559
-
SHA256
ac6f78c77c1d1ffb78e51edd19f57487dd0b137feb5602449cf86696ef339048
-
SHA512
72095638a87aba092482b849629784808baf5218391fbc93fa88879a14d24e3915d344a0a321ba47670a5a1f61c5da32957c3d694305f7d312fe49b1b2ae488e
-
SSDEEP
12288:OMrGy90V+4Y9RQmtIV/yGX6yjCnqR59oM/UyVmvL3/P7dv:0yp3y6GRjCy59omrmvLt
Static task
static1
Behavioral task
behavioral1
Sample
ac6f78c77c1d1ffb78e51edd19f57487dd0b137feb5602449cf86696ef339048.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
ac6f78c77c1d1ffb78e51edd19f57487dd0b137feb5602449cf86696ef339048
-
Size
684KB
-
MD5
836986cce54a048c8c29b41e2bc301a9
-
SHA1
89185b727de852f77b123ec96530c2305a9a0559
-
SHA256
ac6f78c77c1d1ffb78e51edd19f57487dd0b137feb5602449cf86696ef339048
-
SHA512
72095638a87aba092482b849629784808baf5218391fbc93fa88879a14d24e3915d344a0a321ba47670a5a1f61c5da32957c3d694305f7d312fe49b1b2ae488e
-
SSDEEP
12288:OMrGy90V+4Y9RQmtIV/yGX6yjCnqR59oM/UyVmvL3/P7dv:0yp3y6GRjCy59omrmvLt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-