General
-
Target
a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f
-
Size
694KB
-
Sample
230328-sp43babg35
-
MD5
11458beebd7f384b76ea8e630c0e4f1a
-
SHA1
111763ccb0c12299bea9ee2a55b3f1b0a21e8b54
-
SHA256
a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f
-
SHA512
c6c295aea0ff175d4304d2a06d99509ab8f3a8f8de2a1c34196ec629b83cca314d02df54f45310f5dab5099b9bf3684d4eec8e893bb170460c9fa69975d3a5c6
-
SSDEEP
12288:LMrBy90V1/8KsxxApeeH5+oPP8jfE1aDzyOUpRuutZVqdnZDInUBVcTEPT:Kyw7sjApew5nHCfE1O+YurQn5gacTEr
Static task
static1
Behavioral task
behavioral1
Sample
a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Targets
-
-
Target
a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f
-
Size
694KB
-
MD5
11458beebd7f384b76ea8e630c0e4f1a
-
SHA1
111763ccb0c12299bea9ee2a55b3f1b0a21e8b54
-
SHA256
a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f
-
SHA512
c6c295aea0ff175d4304d2a06d99509ab8f3a8f8de2a1c34196ec629b83cca314d02df54f45310f5dab5099b9bf3684d4eec8e893bb170460c9fa69975d3a5c6
-
SSDEEP
12288:LMrBy90V1/8KsxxApeeH5+oPP8jfE1aDzyOUpRuutZVqdnZDInUBVcTEPT:Kyw7sjApew5nHCfE1O+YurQn5gacTEr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-