General
-
Target
62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2
-
Size
658KB
-
Sample
230303-yt9q9aaf6z
-
MD5
4c74fc8bc1e64eed54d5a500882f718d
-
SHA1
e23b317e9d45bf3ee3c2128f416ef0b223b999ad
-
SHA256
62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2
-
SHA512
a5968c0de83e464349ba53b184b4f95ac520759cb46194283b8a470113cd1d7ba7de20572a31553a3bf0aef70fae1172e505b264633bf751648170cc4b8df838
-
SSDEEP
12288:YMryy90qg2e3OcstkRT/NnWdWz3rrgpRJIqV5WqEH4:ay7gv3KtkT/trIpfRG4
Static task
static1
Behavioral task
behavioral1
Sample
62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2
-
Size
658KB
-
MD5
4c74fc8bc1e64eed54d5a500882f718d
-
SHA1
e23b317e9d45bf3ee3c2128f416ef0b223b999ad
-
SHA256
62363718b42ebe8c284b89a7d773fa3dcca921c353c3873de1656fb229b07ce2
-
SHA512
a5968c0de83e464349ba53b184b4f95ac520759cb46194283b8a470113cd1d7ba7de20572a31553a3bf0aef70fae1172e505b264633bf751648170cc4b8df838
-
SSDEEP
12288:YMryy90qg2e3OcstkRT/NnWdWz3rrgpRJIqV5WqEH4:ay7gv3KtkT/trIpfRG4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-