General
-
Target
9b14995fc73bce21446ecd6ebdfab06d04b955f699b692ad91dc67e685b00d64
-
Size
696KB
-
Sample
230328-x2ltqacg38
-
MD5
1dba2a4aa856d5c04e4f87e4659e07f1
-
SHA1
d8520f7e5491cff5a17fb7eb3817f5f87109ec97
-
SHA256
9b14995fc73bce21446ecd6ebdfab06d04b955f699b692ad91dc67e685b00d64
-
SHA512
f8d9fe01032465fb4a41a55b3e3da766c5e7381c1bce11d1f070f397e40284bb18d80b3106ce1bb011c7001a3f4115a8bd8eff4267c1c44c354be15201391d4b
-
SSDEEP
12288:yMrty902mF4MINxAhxKDOOX+TYrrwfXeeqZ19erOY/T31DmrKqe9V23R:Xyq4MYAh8DOOX+TYrrwmeOy6YsWV2B
Static task
static1
Behavioral task
behavioral1
Sample
9b14995fc73bce21446ecd6ebdfab06d04b955f699b692ad91dc67e685b00d64.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Targets
-
-
Target
9b14995fc73bce21446ecd6ebdfab06d04b955f699b692ad91dc67e685b00d64
-
Size
696KB
-
MD5
1dba2a4aa856d5c04e4f87e4659e07f1
-
SHA1
d8520f7e5491cff5a17fb7eb3817f5f87109ec97
-
SHA256
9b14995fc73bce21446ecd6ebdfab06d04b955f699b692ad91dc67e685b00d64
-
SHA512
f8d9fe01032465fb4a41a55b3e3da766c5e7381c1bce11d1f070f397e40284bb18d80b3106ce1bb011c7001a3f4115a8bd8eff4267c1c44c354be15201391d4b
-
SSDEEP
12288:yMrty902mF4MINxAhxKDOOX+TYrrwfXeeqZ19erOY/T31DmrKqe9V23R:Xyq4MYAh8DOOX+TYrrwmeOy6YsWV2B
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-