General
-
Target
8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4
-
Size
690KB
-
Sample
230328-a162yaga88
-
MD5
18dd54cf38ed9d12d03073a8b29fa347
-
SHA1
3c646221303c3c258934796922a7aa2c18bb843d
-
SHA256
8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4
-
SHA512
a741a6f3b2af66fcfee2361c83c05a301abeb85b9663b71d6995cf91cfdd23a7ae76400c8e7aedef02d856769ebf6dd1f8558d34b67a744324055cb1e626801d
-
SSDEEP
12288:VMrqy90wbFXE5f1n80ZR5bsrrIq0Ulj/e5mWXFHqbRfdNoUQhhTjgy:Hyble8C4rkqh7UmWCIBhhT8y
Static task
static1
Behavioral task
behavioral1
Sample
8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4
-
Size
690KB
-
MD5
18dd54cf38ed9d12d03073a8b29fa347
-
SHA1
3c646221303c3c258934796922a7aa2c18bb843d
-
SHA256
8fb89e7915630164ce388dcc48caff2fb425d93e570cc26b64b7a73d9aec19d4
-
SHA512
a741a6f3b2af66fcfee2361c83c05a301abeb85b9663b71d6995cf91cfdd23a7ae76400c8e7aedef02d856769ebf6dd1f8558d34b67a744324055cb1e626801d
-
SSDEEP
12288:VMrqy90wbFXE5f1n80ZR5bsrrIq0Ulj/e5mWXFHqbRfdNoUQhhTjgy:Hyble8C4rkqh7UmWCIBhhT8y
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-