General
-
Target
7f27d7601ac0888baca3490ee40462700aea71b201a48b6f1847253ad922457e
-
Size
534KB
-
Sample
230401-cpymjafd34
-
MD5
1856d5f98fe6a8bb1caba43bc0a20eb5
-
SHA1
24cbe24e68dde4f25b15b845155ce0c6c486cfee
-
SHA256
7f27d7601ac0888baca3490ee40462700aea71b201a48b6f1847253ad922457e
-
SHA512
48047397cdd6da61c879d7502c2c63dde6e61354150e744942f46a348cbe3d1f1c87882a5038c215f5d7fc2ec79fe6ab28e68618a596f97f61bf3255c2148703
-
SSDEEP
12288:VMrQy90StrtGoQ3aMNp52tLuzTbVW6Tu97mz5rOM:pydfGoQKSpeuz3VbTulmz5rOM
Static task
static1
Behavioral task
behavioral1
Sample
7f27d7601ac0888baca3490ee40462700aea71b201a48b6f1847253ad922457e.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
7f27d7601ac0888baca3490ee40462700aea71b201a48b6f1847253ad922457e
-
Size
534KB
-
MD5
1856d5f98fe6a8bb1caba43bc0a20eb5
-
SHA1
24cbe24e68dde4f25b15b845155ce0c6c486cfee
-
SHA256
7f27d7601ac0888baca3490ee40462700aea71b201a48b6f1847253ad922457e
-
SHA512
48047397cdd6da61c879d7502c2c63dde6e61354150e744942f46a348cbe3d1f1c87882a5038c215f5d7fc2ec79fe6ab28e68618a596f97f61bf3255c2148703
-
SSDEEP
12288:VMrQy90StrtGoQ3aMNp52tLuzTbVW6Tu97mz5rOM:pydfGoQKSpeuz3VbTulmz5rOM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-