General
-
Target
460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc
-
Size
666KB
-
Sample
230303-ndv8tahc24
-
MD5
9c71f9bc24d6f5b82978c2c314bbf1fe
-
SHA1
0a1d0ebbd2f2db2e55cbe52ec89020938fcc0576
-
SHA256
460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc
-
SHA512
ae03e4876d0d8be801a13b8b1c054706c18136fac151fcfb350e8c03d9ad300ab215c57c7d0e8a2eed5eceb0ccb1de5721efa9c4f7308d2ed607b48f8269b02b
-
SSDEEP
12288:+MrNy9063w+cF1WFcie3lj0NiCpgOOfUyMan9jPN+SRVrn5Z6ozXIW:LyLw+WWXCfUyManlPNlRt5ZnXL
Static task
static1
Behavioral task
behavioral1
Sample
460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
flurs
hueref.eu:4162
-
auth_value
967190a484bd63836957d2fa7d601592
Targets
-
-
Target
460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc
-
Size
666KB
-
MD5
9c71f9bc24d6f5b82978c2c314bbf1fe
-
SHA1
0a1d0ebbd2f2db2e55cbe52ec89020938fcc0576
-
SHA256
460e2adec1d0b10524e0543749e6aa620c145bdc3f66326e5894943c437563fc
-
SHA512
ae03e4876d0d8be801a13b8b1c054706c18136fac151fcfb350e8c03d9ad300ab215c57c7d0e8a2eed5eceb0ccb1de5721efa9c4f7308d2ed607b48f8269b02b
-
SSDEEP
12288:+MrNy9063w+cF1WFcie3lj0NiCpgOOfUyMan9jPN+SRVrn5Z6ozXIW:LyLw+WWXCfUyManlPNlRt5ZnXL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-