General
-
Target
a3daf511e064b06f3edc331d32263641aa6817cefbf9c3ce447833656456962e
-
Size
531KB
-
Sample
230304-gpz8kscd2s
-
MD5
d85ed60d0dda1ae7e6a63574e48419cd
-
SHA1
56a1b8ae81fa4b3e0a74108715b9296ba8433362
-
SHA256
a3daf511e064b06f3edc331d32263641aa6817cefbf9c3ce447833656456962e
-
SHA512
fc7b20132b31938307bf24161edbc0cd2f7784f4541e0a22d590ee44b38a99bc611a147890845c2cca4556dbfa26e3b71ac6fdf1c36036dfe1614f397c5f5aa2
-
SSDEEP
12288:tMrgy90GT60uj1XrynKcldwkbklnwfocop9w4CyIa4rGx1bk20NlfsOO:5y1T611enKEdwkbInM5Ib4rWk2ElfsOO
Static task
static1
Behavioral task
behavioral1
Sample
a3daf511e064b06f3edc331d32263641aa6817cefbf9c3ce447833656456962e.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
a3daf511e064b06f3edc331d32263641aa6817cefbf9c3ce447833656456962e
-
Size
531KB
-
MD5
d85ed60d0dda1ae7e6a63574e48419cd
-
SHA1
56a1b8ae81fa4b3e0a74108715b9296ba8433362
-
SHA256
a3daf511e064b06f3edc331d32263641aa6817cefbf9c3ce447833656456962e
-
SHA512
fc7b20132b31938307bf24161edbc0cd2f7784f4541e0a22d590ee44b38a99bc611a147890845c2cca4556dbfa26e3b71ac6fdf1c36036dfe1614f397c5f5aa2
-
SSDEEP
12288:tMrgy90GT60uj1XrynKcldwkbklnwfocop9w4CyIa4rGx1bk20NlfsOO:5y1T611enKEdwkbInM5Ib4rWk2ElfsOO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-