General
-
Target
dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262
-
Size
697KB
-
Sample
230328-nv2f6acd6x
-
MD5
04b31462db6b78ad20675f29f2af7ef5
-
SHA1
0c0b0a37e1291b2a93e77e2653a04f2c3462aac5
-
SHA256
dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262
-
SHA512
bed099d097ab5f888c70e8ad25f6c35c41af15ee1ac63b9c1866fa1a852a3b399f77aba0ad512e693ba1a6a96d408ee858bc1267683a2aaa5d98705c102ffd40
-
SSDEEP
12288:oMrdy90ySwc0A9dBC3dtZsiZZhrp/YDx8WLkZ9LL6scGjqAxI9gja0bxAB4:1yvwBC3/aiZH4x5kvOGjnI9adSB4
Static task
static1
Behavioral task
behavioral1
Sample
dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Targets
-
-
Target
dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262
-
Size
697KB
-
MD5
04b31462db6b78ad20675f29f2af7ef5
-
SHA1
0c0b0a37e1291b2a93e77e2653a04f2c3462aac5
-
SHA256
dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262
-
SHA512
bed099d097ab5f888c70e8ad25f6c35c41af15ee1ac63b9c1866fa1a852a3b399f77aba0ad512e693ba1a6a96d408ee858bc1267683a2aaa5d98705c102ffd40
-
SSDEEP
12288:oMrdy90ySwc0A9dBC3dtZsiZZhrp/YDx8WLkZ9LL6scGjqAxI9gja0bxAB4:1yvwBC3/aiZH4x5kvOGjnI9adSB4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-