General
-
Target
32a473aace67d7bbd74fbe817a0cb00a5403bdaaecc3cff3799558892c06f47f
-
Size
533KB
-
Sample
230331-1mgs1adf88
-
MD5
ef456b823d6357923f0e7a6ba3328ff9
-
SHA1
0ee725d95e7a03e3e20d54ac0cda66ead65ec54b
-
SHA256
32a473aace67d7bbd74fbe817a0cb00a5403bdaaecc3cff3799558892c06f47f
-
SHA512
ea965a98f2e2afcbbf2a6d8ee614d48b48815b0255606f51f51321776a1057b5fe1f50b3dd1d599708af570398b8ec56c87f20b9d7a2bcf7f8b6f5b2e7cf54d9
-
SSDEEP
12288:ZMrCy90FesLJUeLlUN6d2L3Lq7NAPNRq6:PyeBKeLl060L3G7mTB
Static task
static1
Behavioral task
behavioral1
Sample
32a473aace67d7bbd74fbe817a0cb00a5403bdaaecc3cff3799558892c06f47f.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
32a473aace67d7bbd74fbe817a0cb00a5403bdaaecc3cff3799558892c06f47f
-
Size
533KB
-
MD5
ef456b823d6357923f0e7a6ba3328ff9
-
SHA1
0ee725d95e7a03e3e20d54ac0cda66ead65ec54b
-
SHA256
32a473aace67d7bbd74fbe817a0cb00a5403bdaaecc3cff3799558892c06f47f
-
SHA512
ea965a98f2e2afcbbf2a6d8ee614d48b48815b0255606f51f51321776a1057b5fe1f50b3dd1d599708af570398b8ec56c87f20b9d7a2bcf7f8b6f5b2e7cf54d9
-
SSDEEP
12288:ZMrCy90FesLJUeLlUN6d2L3Lq7NAPNRq6:PyeBKeLl060L3G7mTB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-