General
-
Target
db2d6443fb385d53882fd224cc64c78360491134f5bba9a2b1c284c49f237004
-
Size
671KB
-
Sample
230331-1d1vhsdf42
-
MD5
e93fe54c071811eab2052c98318a944f
-
SHA1
90ae1663586f9da54c5ef8499ded9585e655c2b6
-
SHA256
db2d6443fb385d53882fd224cc64c78360491134f5bba9a2b1c284c49f237004
-
SHA512
c5c353b2a045e39b7b5d6fdcd6f14f1433f05d801fcbddc69884a0e982cf8238662330ba94321bfa47d802f08b41c1240d91db1639380a60fed741a0414308b5
-
SSDEEP
12288:8Mrqy90ItvHKWA7+p9Mt6XUGVXP90fgJD2BqVrSUfcyQOTBP3Lq71uzN7hcw0:uyrtHKWY+p9MKFXP90fqykSUf+2BP3Gt
Static task
static1
Behavioral task
behavioral1
Sample
db2d6443fb385d53882fd224cc64c78360491134f5bba9a2b1c284c49f237004.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
db2d6443fb385d53882fd224cc64c78360491134f5bba9a2b1c284c49f237004
-
Size
671KB
-
MD5
e93fe54c071811eab2052c98318a944f
-
SHA1
90ae1663586f9da54c5ef8499ded9585e655c2b6
-
SHA256
db2d6443fb385d53882fd224cc64c78360491134f5bba9a2b1c284c49f237004
-
SHA512
c5c353b2a045e39b7b5d6fdcd6f14f1433f05d801fcbddc69884a0e982cf8238662330ba94321bfa47d802f08b41c1240d91db1639380a60fed741a0414308b5
-
SSDEEP
12288:8Mrqy90ItvHKWA7+p9Mt6XUGVXP90fgJD2BqVrSUfcyQOTBP3Lq71uzN7hcw0:uyrtHKWY+p9MKFXP90fqykSUf+2BP3Gt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-