General
-
Target
076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde
-
Size
673KB
-
Sample
230331-2wnhksfe3w
-
MD5
27759028fa5043281fd931f40d064e4b
-
SHA1
dde27b366be795b23952e039b6e6d494dddc762e
-
SHA256
076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde
-
SHA512
eee77c499616af97f3670126e9db64c1ac661f80695ab60bca52a950f687a920809915a1e1e61cfae3a9a689c25462655d6808ca4e213330f02e7fcb644e9beb
-
SSDEEP
12288:LMriy90R7WN32Up/iKyE0MsLu3Da0UDN6buWah3SnfCxErj4w:FyS7WN3f/itED53D+DNyuNDxEvH
Static task
static1
Behavioral task
behavioral1
Sample
076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde
-
Size
673KB
-
MD5
27759028fa5043281fd931f40d064e4b
-
SHA1
dde27b366be795b23952e039b6e6d494dddc762e
-
SHA256
076baf1e2e91ecf3c4d939176ee07f48daa011eb889f9d201fa6a2b4b6ec9fde
-
SHA512
eee77c499616af97f3670126e9db64c1ac661f80695ab60bca52a950f687a920809915a1e1e61cfae3a9a689c25462655d6808ca4e213330f02e7fcb644e9beb
-
SSDEEP
12288:LMriy90R7WN32Up/iKyE0MsLu3Da0UDN6buWah3SnfCxErj4w:FyS7WN3f/itED53D+DNyuNDxEvH
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-