General
-
Target
f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601
-
Size
531KB
-
Sample
230401-3q83rsdd82
-
MD5
1a14ccde94897499deea2a69c473fb01
-
SHA1
430809095604e7b0ed005f8764171132b7e409a0
-
SHA256
f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601
-
SHA512
9b5080e831e9ac1d3d13cd0101802b6a147cc6c4e4af3738e76b357377b23ee7412222776fe3d70bab56db548b40ce3436ebcded55cf44f7a65929e4a2990829
-
SSDEEP
12288:iMrIy90NQwkINmGg3NTRG7IF1ryudvJyqf5KXa/wm1blWnlCqFOrAIQx:WyOkINeRG7IF9x3Arm1bElCMgG
Static task
static1
Behavioral task
behavioral1
Sample
f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601
-
Size
531KB
-
MD5
1a14ccde94897499deea2a69c473fb01
-
SHA1
430809095604e7b0ed005f8764171132b7e409a0
-
SHA256
f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601
-
SHA512
9b5080e831e9ac1d3d13cd0101802b6a147cc6c4e4af3738e76b357377b23ee7412222776fe3d70bab56db548b40ce3436ebcded55cf44f7a65929e4a2990829
-
SSDEEP
12288:iMrIy90NQwkINmGg3NTRG7IF1ryudvJyqf5KXa/wm1blWnlCqFOrAIQx:WyOkINeRG7IF9x3Arm1bElCMgG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-