General
-
Target
2235c9574f3dcad27f1a76cfdd14f7e7e83b31dd880ea0fef36fa034c7360936
-
Size
673KB
-
Sample
230331-w8etbadg81
-
MD5
487b9988714dba1390b206084c6dfb5e
-
SHA1
77f858f049835dbeed2c11f0b7764fe65c1efe0a
-
SHA256
2235c9574f3dcad27f1a76cfdd14f7e7e83b31dd880ea0fef36fa034c7360936
-
SHA512
aea324c07dca4d39bbd463af789696439fbc4dad5c10e3a3df7086bd838d3ed80a0bf607a49e97c53ad9a68d6b9459f00c2983a74d044496fb78a4f416f41a8e
-
SSDEEP
12288:UMrQy90PmiUyu9qWXYehaGmCFIsmkeH8gsomVX+YpvhapZl0Nf+s2l:Eyo4yuX7hae88gsoBaYfl0Nf9M
Static task
static1
Behavioral task
behavioral1
Sample
2235c9574f3dcad27f1a76cfdd14f7e7e83b31dd880ea0fef36fa034c7360936.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
2235c9574f3dcad27f1a76cfdd14f7e7e83b31dd880ea0fef36fa034c7360936
-
Size
673KB
-
MD5
487b9988714dba1390b206084c6dfb5e
-
SHA1
77f858f049835dbeed2c11f0b7764fe65c1efe0a
-
SHA256
2235c9574f3dcad27f1a76cfdd14f7e7e83b31dd880ea0fef36fa034c7360936
-
SHA512
aea324c07dca4d39bbd463af789696439fbc4dad5c10e3a3df7086bd838d3ed80a0bf607a49e97c53ad9a68d6b9459f00c2983a74d044496fb78a4f416f41a8e
-
SSDEEP
12288:UMrQy90PmiUyu9qWXYehaGmCFIsmkeH8gsomVX+YpvhapZl0Nf+s2l:Eyo4yuX7hae88gsoBaYfl0Nf9M
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-