General
-
Target
cd6b847334c6a9eab812c2d69ebfd2fa853c8d18c089e691fc7d690ae5c9bda5
-
Size
530KB
-
Sample
230401-1wpj7sed5y
-
MD5
4d2a45c338ebd0ae385806186c13083f
-
SHA1
8854c79c38f48d06176dd8925f4de07caff5273e
-
SHA256
cd6b847334c6a9eab812c2d69ebfd2fa853c8d18c089e691fc7d690ae5c9bda5
-
SHA512
5a2189d7995570e1874a2019972872457a22ee399aca79770322ba643cb55fcd3785a05ff6bf6210382529d28932a68b5ac6f04f6d650a6b149e39acc95c44bc
-
SSDEEP
12288:LMr6y90Q4U0EKpi5DRGBZzf5KXa/YhmaSX8q6IrM2M:xyQ+DRSAhhmaSX8qBrMb
Static task
static1
Behavioral task
behavioral1
Sample
cd6b847334c6a9eab812c2d69ebfd2fa853c8d18c089e691fc7d690ae5c9bda5.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
cd6b847334c6a9eab812c2d69ebfd2fa853c8d18c089e691fc7d690ae5c9bda5
-
Size
530KB
-
MD5
4d2a45c338ebd0ae385806186c13083f
-
SHA1
8854c79c38f48d06176dd8925f4de07caff5273e
-
SHA256
cd6b847334c6a9eab812c2d69ebfd2fa853c8d18c089e691fc7d690ae5c9bda5
-
SHA512
5a2189d7995570e1874a2019972872457a22ee399aca79770322ba643cb55fcd3785a05ff6bf6210382529d28932a68b5ac6f04f6d650a6b149e39acc95c44bc
-
SSDEEP
12288:LMr6y90Q4U0EKpi5DRGBZzf5KXa/YhmaSX8q6IrM2M:xyQ+DRSAhhmaSX8qBrMb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-