General
-
Target
6ba85e1898ef2155063bdc5676e53e5cfee1fc0269dd7fa03b8ef72e876cbf11
-
Size
530KB
-
Sample
230304-jr3gtscf41
-
MD5
058621a56040b965895fb5c1c4e29f20
-
SHA1
30e7540b717383ff31b3b80a917deb98463a81aa
-
SHA256
6ba85e1898ef2155063bdc5676e53e5cfee1fc0269dd7fa03b8ef72e876cbf11
-
SHA512
7188cc72dc3918a47367d0877c747914a2a189a05a3c0c5f288cc028e274dd72f481268149b97decb1a771aa93ff56d4d8500d365423007eb94fca0fad902268
-
SSDEEP
12288:BMr5y90dNzS1Yjz+Oo8JE9K4NO1/Bjg1TC4WEw85:IyejzDh+q/heTDpv
Static task
static1
Behavioral task
behavioral1
Sample
6ba85e1898ef2155063bdc5676e53e5cfee1fc0269dd7fa03b8ef72e876cbf11.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
6ba85e1898ef2155063bdc5676e53e5cfee1fc0269dd7fa03b8ef72e876cbf11
-
Size
530KB
-
MD5
058621a56040b965895fb5c1c4e29f20
-
SHA1
30e7540b717383ff31b3b80a917deb98463a81aa
-
SHA256
6ba85e1898ef2155063bdc5676e53e5cfee1fc0269dd7fa03b8ef72e876cbf11
-
SHA512
7188cc72dc3918a47367d0877c747914a2a189a05a3c0c5f288cc028e274dd72f481268149b97decb1a771aa93ff56d4d8500d365423007eb94fca0fad902268
-
SSDEEP
12288:BMr5y90dNzS1Yjz+Oo8JE9K4NO1/Bjg1TC4WEw85:IyejzDh+q/heTDpv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-