General
-
Target
cc611b3b8acc9bbbba36abe0663c5951a49001c30848c11a1fccdcc3477138c5
-
Size
698KB
-
Sample
230328-pp8hysba38
-
MD5
c69e94035b5cd6813b11cebca37b3cc5
-
SHA1
fb70fe34561cd016003eaad905eb8ff61efa3405
-
SHA256
cc611b3b8acc9bbbba36abe0663c5951a49001c30848c11a1fccdcc3477138c5
-
SHA512
e0c53ecf702ac28c78dc3a1dfcb7a4abccdb0a1371080ca5f7a43e14f78ceffb35c19f25fc18020241a29c0c518469ce3279c6a69fc54aea102dec43682c53fa
-
SSDEEP
12288:BMr7y90dFO18LvF74F8GVz10SZL6fzGj7AxI9grGMNgBblv:+yCkWNUFtZ0oMGjYI9GpuBb5
Static task
static1
Behavioral task
behavioral1
Sample
cc611b3b8acc9bbbba36abe0663c5951a49001c30848c11a1fccdcc3477138c5.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Targets
-
-
Target
cc611b3b8acc9bbbba36abe0663c5951a49001c30848c11a1fccdcc3477138c5
-
Size
698KB
-
MD5
c69e94035b5cd6813b11cebca37b3cc5
-
SHA1
fb70fe34561cd016003eaad905eb8ff61efa3405
-
SHA256
cc611b3b8acc9bbbba36abe0663c5951a49001c30848c11a1fccdcc3477138c5
-
SHA512
e0c53ecf702ac28c78dc3a1dfcb7a4abccdb0a1371080ca5f7a43e14f78ceffb35c19f25fc18020241a29c0c518469ce3279c6a69fc54aea102dec43682c53fa
-
SSDEEP
12288:BMr7y90dFO18LvF74F8GVz10SZL6fzGj7AxI9grGMNgBblv:+yCkWNUFtZ0oMGjYI9GpuBb5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-