General
-
Target
871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca
-
Size
801KB
-
Sample
230410-xtt55ahc2y
-
MD5
cd5e28fc1d6ff681fb019650c78b1872
-
SHA1
e69cf6988db840394aeba4b6c8a52f81e3260a92
-
SHA256
871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca
-
SHA512
52f895ef65f20db5a6b5bf247e8a86f7e136dae7e027f1b960cd3c75feace6a8d13ea8c2ad5ff0f575efb57643764318b48fec59e6a3a2f7340c57d5a02e0c56
-
SSDEEP
12288:RMrCy901b0WyeiPjG0jkkz7xHE5BOwchsn3EdEaFvtZz+noi+s1E:ny+XiPjG0jxtCOwbYFZIoi3E
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca
-
Size
801KB
-
MD5
cd5e28fc1d6ff681fb019650c78b1872
-
SHA1
e69cf6988db840394aeba4b6c8a52f81e3260a92
-
SHA256
871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca
-
SHA512
52f895ef65f20db5a6b5bf247e8a86f7e136dae7e027f1b960cd3c75feace6a8d13ea8c2ad5ff0f575efb57643764318b48fec59e6a3a2f7340c57d5a02e0c56
-
SSDEEP
12288:RMrCy901b0WyeiPjG0jkkz7xHE5BOwchsn3EdEaFvtZz+noi+s1E:ny+XiPjG0jxtCOwbYFZIoi3E
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-