General
-
Target
5648a3093938b887c0224688ed377a6b50daaaab50df538b18ea70c44440dd48
-
Size
699KB
-
Sample
230328-mbz9bacb4v
-
MD5
da8aab197d44484e44024b656a7675c8
-
SHA1
960166cd2f0fcc6851514f7393c493a4424a2f89
-
SHA256
5648a3093938b887c0224688ed377a6b50daaaab50df538b18ea70c44440dd48
-
SHA512
69d92abf413bd98aab6158ad5d47c2a7746ee5e94cfbbec7cafdee902afd2afcfff55ea19f8c755509bec1b8f6423f58f5312a3b3a1d513998a1e91245f46e86
-
SSDEEP
12288:lMrWy90/MBYNEgVjS8U65XG1tvhYpEvfVahZDJAtXgtkr2m69EGjVyxv9gzQQTXJ:rygjS8UxJqavMh5JC4U5GjMv9O45AJ
Static task
static1
Behavioral task
behavioral1
Sample
5648a3093938b887c0224688ed377a6b50daaaab50df538b18ea70c44440dd48.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Targets
-
-
Target
5648a3093938b887c0224688ed377a6b50daaaab50df538b18ea70c44440dd48
-
Size
699KB
-
MD5
da8aab197d44484e44024b656a7675c8
-
SHA1
960166cd2f0fcc6851514f7393c493a4424a2f89
-
SHA256
5648a3093938b887c0224688ed377a6b50daaaab50df538b18ea70c44440dd48
-
SHA512
69d92abf413bd98aab6158ad5d47c2a7746ee5e94cfbbec7cafdee902afd2afcfff55ea19f8c755509bec1b8f6423f58f5312a3b3a1d513998a1e91245f46e86
-
SSDEEP
12288:lMrWy90/MBYNEgVjS8U65XG1tvhYpEvfVahZDJAtXgtkr2m69EGjVyxv9gzQQTXJ:rygjS8UxJqavMh5JC4U5GjMv9O45AJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-