General
-
Target
938458919473777c6aa215ebb211dc5202cec933b243816f76f267d3ed91b30c
-
Size
531KB
-
Sample
230304-cmsnhacd26
-
MD5
aac423f030573bd571f44435176e8c04
-
SHA1
7481f51ec176fd6aaa05cb464053f38954c58d0e
-
SHA256
938458919473777c6aa215ebb211dc5202cec933b243816f76f267d3ed91b30c
-
SHA512
82f0d6434263e0da5bcf4a2f8ae7ee0081f75bf0fc062a31123f853bdefd22395327dcf7dc1d7c483dbb048c27dec8af2bc5ff4ad834425920ed53f035bd6456
-
SSDEEP
12288:XMr3y90WU/YtWMa+5YoAVm7eLtWJbVWISnfbGeE:MyqQt1a+/AVm7guWvfbxE
Static task
static1
Behavioral task
behavioral1
Sample
938458919473777c6aa215ebb211dc5202cec933b243816f76f267d3ed91b30c.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
938458919473777c6aa215ebb211dc5202cec933b243816f76f267d3ed91b30c
-
Size
531KB
-
MD5
aac423f030573bd571f44435176e8c04
-
SHA1
7481f51ec176fd6aaa05cb464053f38954c58d0e
-
SHA256
938458919473777c6aa215ebb211dc5202cec933b243816f76f267d3ed91b30c
-
SHA512
82f0d6434263e0da5bcf4a2f8ae7ee0081f75bf0fc062a31123f853bdefd22395327dcf7dc1d7c483dbb048c27dec8af2bc5ff4ad834425920ed53f035bd6456
-
SSDEEP
12288:XMr3y90WU/YtWMa+5YoAVm7eLtWJbVWISnfbGeE:MyqQt1a+/AVm7guWvfbxE
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-