General
-
Target
416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b
-
Size
698KB
-
Sample
230328-ndeaasaf52
-
MD5
b4a752aa7501627ab288dd3188c59e4c
-
SHA1
cf595ede743c4034c3d52ac783872e7ca0d009f4
-
SHA256
416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b
-
SHA512
e5d27819f1e28a61d0123e21c1a2692bf7806c847ce5390b656d38530864198e44819dc7eb91afbe76eaff848ad8a2cf3d7e523d8bfcca85904a1724449875ac
-
SSDEEP
12288:NMr9y90Kqw9HCX9jlF0puBt8NGz1PAqL6ZDGjpAxI9gHnpLoTW5u8:gyt9iXB37Z7MGjiI9gpLoeu8
Static task
static1
Behavioral task
behavioral1
Sample
416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Targets
-
-
Target
416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b
-
Size
698KB
-
MD5
b4a752aa7501627ab288dd3188c59e4c
-
SHA1
cf595ede743c4034c3d52ac783872e7ca0d009f4
-
SHA256
416444ff272c46aaa571bb3ce47c9e83dab1f6bf7f06eb200f44f62292475c6b
-
SHA512
e5d27819f1e28a61d0123e21c1a2692bf7806c847ce5390b656d38530864198e44819dc7eb91afbe76eaff848ad8a2cf3d7e523d8bfcca85904a1724449875ac
-
SSDEEP
12288:NMr9y90Kqw9HCX9jlF0puBt8NGz1PAqL6ZDGjpAxI9gHnpLoTW5u8:gyt9iXB37Z7MGjiI9gpLoeu8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-