General
-
Target
fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa
-
Size
530KB
-
Sample
230401-2z1x3sdc55
-
MD5
31d9b4f28f11337f9a582e317ec07ac4
-
SHA1
bbf881e49d61adc607d6c1279d3dfb378581c1e9
-
SHA256
fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa
-
SHA512
3b215f61824230e14bd8716b95b7b5c1b326e377e66c75488052253e208199ba17eb3cf8eb584b7fd7061f22ad890d1fdcb30452cb9e302c8e5f1f4e107fef88
-
SSDEEP
12288:nMrOy90/9cbdXV5m16m8asK8G0i/wf5KXa/3mOj00zNkS:py62b0n8BWkA0mDgSS
Static task
static1
Behavioral task
behavioral1
Sample
fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa
-
Size
530KB
-
MD5
31d9b4f28f11337f9a582e317ec07ac4
-
SHA1
bbf881e49d61adc607d6c1279d3dfb378581c1e9
-
SHA256
fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa
-
SHA512
3b215f61824230e14bd8716b95b7b5c1b326e377e66c75488052253e208199ba17eb3cf8eb584b7fd7061f22ad890d1fdcb30452cb9e302c8e5f1f4e107fef88
-
SSDEEP
12288:nMrOy90/9cbdXV5m16m8asK8G0i/wf5KXa/3mOj00zNkS:py62b0n8BWkA0mDgSS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-