General
-
Target
b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a
-
Size
684KB
-
Sample
230328-jl5d8shf66
-
MD5
a8110a5f0154f9a05e8f4dc75cc9e5f6
-
SHA1
c1b14297e9bc68837274d891859dcc1e6d95dce4
-
SHA256
b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a
-
SHA512
cec227b0fd54d4965efaf2b568167c52567729ae5736ebc5a503f1cf8e7bab27db94f0a9530f23ecaefa0f22eaa51f0339ed7630d485788d7f279e7761a1cd97
-
SSDEEP
12288:aMriy90vXsX5JpP5p+nJb6yjC32R51yazMwH5UUVmzL3w3:EyhKjCm5MGfH5vmzL4
Static task
static1
Behavioral task
behavioral1
Sample
b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a
-
Size
684KB
-
MD5
a8110a5f0154f9a05e8f4dc75cc9e5f6
-
SHA1
c1b14297e9bc68837274d891859dcc1e6d95dce4
-
SHA256
b0d9a6c2897589876c6a6f7477b9a2efc1b9475255b36c15bde4329565d5862a
-
SHA512
cec227b0fd54d4965efaf2b568167c52567729ae5736ebc5a503f1cf8e7bab27db94f0a9530f23ecaefa0f22eaa51f0339ed7630d485788d7f279e7761a1cd97
-
SSDEEP
12288:aMriy90vXsX5JpP5p+nJb6yjC32R51yazMwH5UUVmzL3w3:EyhKjCm5MGfH5vmzL4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-