General
-
Target
460e95d846336532cb386801a4669d95d7607ad56b027de247d60e2e17106916
-
Size
695KB
-
Sample
230328-p9sy1acg5y
-
MD5
fda58c390139fae7dd07ee5877db73a0
-
SHA1
f573adf0056b804a856ec6399e075d7cccdd5847
-
SHA256
460e95d846336532cb386801a4669d95d7607ad56b027de247d60e2e17106916
-
SHA512
f76ca33c499803c131fa84f94bf0676ecfd1bfb13f15d3e7673082bf703706bac614ab1d2126b983e6f5e0eb178df928d1ea01de0e14888e61a6396d1aca29e7
-
SSDEEP
12288:5Mr7y90Ons+dRvezUboHnelO0/6s4ZjN81U4XguJZ2BO5Ek/a/mK6LG:6y9sYRezWYelO0/6s4Zh81U4XHb/Imc
Static task
static1
Behavioral task
behavioral1
Sample
460e95d846336532cb386801a4669d95d7607ad56b027de247d60e2e17106916.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Targets
-
-
Target
460e95d846336532cb386801a4669d95d7607ad56b027de247d60e2e17106916
-
Size
695KB
-
MD5
fda58c390139fae7dd07ee5877db73a0
-
SHA1
f573adf0056b804a856ec6399e075d7cccdd5847
-
SHA256
460e95d846336532cb386801a4669d95d7607ad56b027de247d60e2e17106916
-
SHA512
f76ca33c499803c131fa84f94bf0676ecfd1bfb13f15d3e7673082bf703706bac614ab1d2126b983e6f5e0eb178df928d1ea01de0e14888e61a6396d1aca29e7
-
SSDEEP
12288:5Mr7y90Ons+dRvezUboHnelO0/6s4ZjN81U4XguJZ2BO5Ek/a/mK6LG:6y9sYRezWYelO0/6s4Zh81U4XHb/Imc
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-