General
-
Target
7f80787d38486459a9c104bc8c42dd78c68e0e27411be54897379c415c7c73fd
-
Size
690KB
-
Sample
230328-a5w3jahh8w
-
MD5
0c87128b0af187a9fe71653d1a0e5263
-
SHA1
001166bb1806c1063c1c1cea0ef6098514871057
-
SHA256
7f80787d38486459a9c104bc8c42dd78c68e0e27411be54897379c415c7c73fd
-
SHA512
e276d4155b9d5d0a68c5474f756eef46abf49adeb78ef13f3d70c5c7da785f000c7c55044641e2c6f09a7b2af2f96d60d4f9c0889de4143af59f92779e8696ba
-
SSDEEP
12288:XMrUy90DLtlNOkp0zgKrIv1HTh3K43YALqOoTgBetsh0T7YU1+iiWW1kfd:ryQNeg2oph0AmOoEBeGhVyEM
Static task
static1
Behavioral task
behavioral1
Sample
7f80787d38486459a9c104bc8c42dd78c68e0e27411be54897379c415c7c73fd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
7f80787d38486459a9c104bc8c42dd78c68e0e27411be54897379c415c7c73fd
-
Size
690KB
-
MD5
0c87128b0af187a9fe71653d1a0e5263
-
SHA1
001166bb1806c1063c1c1cea0ef6098514871057
-
SHA256
7f80787d38486459a9c104bc8c42dd78c68e0e27411be54897379c415c7c73fd
-
SHA512
e276d4155b9d5d0a68c5474f756eef46abf49adeb78ef13f3d70c5c7da785f000c7c55044641e2c6f09a7b2af2f96d60d4f9c0889de4143af59f92779e8696ba
-
SSDEEP
12288:XMrUy90DLtlNOkp0zgKrIv1HTh3K43YALqOoTgBetsh0T7YU1+iiWW1kfd:ryQNeg2oph0AmOoEBeGhVyEM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-