General
-
Target
834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f
-
Size
684KB
-
Sample
230328-jj58rabe2s
-
MD5
fdca260dbb70f4f9e960ed73cdf9a41f
-
SHA1
d0917ee0c376b76a1ac683c4859a9549fc857061
-
SHA256
834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f
-
SHA512
eea03297e3cdc78d57b33bd8857cfab3fa9352062443c8c62f24669a9cc8d0ca1f9f715e8034b0112bee5415b41dcf144d5dabb373c2e7065e4bc45a6868bb08
-
SSDEEP
12288:yMroy90y2ilgmTHLO+BhwaD0gbO26yjCcpR5o8LgIAUV8U7nm+L3epUlQoZh/:myKiJfOkhwaDjbO+jC25AICKm+LupW/
Static task
static1
Behavioral task
behavioral1
Sample
834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f
-
Size
684KB
-
MD5
fdca260dbb70f4f9e960ed73cdf9a41f
-
SHA1
d0917ee0c376b76a1ac683c4859a9549fc857061
-
SHA256
834868e3fb16635960b61edd43e628eec1ac24b6ae3e62fe6a5ee2348b2b215f
-
SHA512
eea03297e3cdc78d57b33bd8857cfab3fa9352062443c8c62f24669a9cc8d0ca1f9f715e8034b0112bee5415b41dcf144d5dabb373c2e7065e4bc45a6868bb08
-
SSDEEP
12288:yMroy90y2ilgmTHLO+BhwaD0gbO26yjCcpR5o8LgIAUV8U7nm+L3epUlQoZh/:myKiJfOkhwaDjbO+jC25AICKm+LupW/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-