General
-
Target
0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3
-
Size
530KB
-
Sample
230304-femn3acg48
-
MD5
8265d0a33a7188d8fdce39d43b05f850
-
SHA1
0894bd1e3b2b988e5c341fc8b0390a5f0134fd85
-
SHA256
0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3
-
SHA512
1150ae0ffbb8b0433fe09ec4909a18894d4521d3bf2c431af543cf7e7479fef803161d4bc78050ecd730c8615971cb96984413e40fef45b019210265695cb168
-
SSDEEP
12288:eMrcy90tqhb9xae1ZCTItUC5VHWQZ2kQ3Z09xhItNqZG:CyD9PP12IqCr2BgCqU
Static task
static1
Behavioral task
behavioral1
Sample
0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3
-
Size
530KB
-
MD5
8265d0a33a7188d8fdce39d43b05f850
-
SHA1
0894bd1e3b2b988e5c341fc8b0390a5f0134fd85
-
SHA256
0fd7564efda9cb28115bbc4db334f03a0004a287a48bea84f2578603662c11e3
-
SHA512
1150ae0ffbb8b0433fe09ec4909a18894d4521d3bf2c431af543cf7e7479fef803161d4bc78050ecd730c8615971cb96984413e40fef45b019210265695cb168
-
SSDEEP
12288:eMrcy90tqhb9xae1ZCTItUC5VHWQZ2kQ3Z09xhItNqZG:CyD9PP12IqCr2BgCqU
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-