General
-
Target
da50a278d4eec907708499beb06d471e963c221b719b47aa22f7a30cf9f9a177
-
Size
531KB
-
Sample
230304-lnn65sdf32
-
MD5
2547bb2d65ef1642149f5a03bb4828ae
-
SHA1
3ee631812ff5bc4b4d84f65b11f87b6a8990a17a
-
SHA256
da50a278d4eec907708499beb06d471e963c221b719b47aa22f7a30cf9f9a177
-
SHA512
0cd27242dea1439177d959997b97d3c0d869e1f19d778841bcb4e8c67fb0eb7366916850b330e155ee9c45d3360c16ea40100f38d8d777c730b6c0feceb81f64
-
SSDEEP
12288:fMroy909obW3wbhsvlY39pUBf0A8HQe8K:jyEQW3wCdY9y28K
Static task
static1
Behavioral task
behavioral1
Sample
da50a278d4eec907708499beb06d471e963c221b719b47aa22f7a30cf9f9a177.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
da50a278d4eec907708499beb06d471e963c221b719b47aa22f7a30cf9f9a177
-
Size
531KB
-
MD5
2547bb2d65ef1642149f5a03bb4828ae
-
SHA1
3ee631812ff5bc4b4d84f65b11f87b6a8990a17a
-
SHA256
da50a278d4eec907708499beb06d471e963c221b719b47aa22f7a30cf9f9a177
-
SHA512
0cd27242dea1439177d959997b97d3c0d869e1f19d778841bcb4e8c67fb0eb7366916850b330e155ee9c45d3360c16ea40100f38d8d777c730b6c0feceb81f64
-
SSDEEP
12288:fMroy909obW3wbhsvlY39pUBf0A8HQe8K:jyEQW3wCdY9y28K
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-