General
-
Target
0d627f91d590e18b45b2a3601abab72edeb3ddbd1c22056cfc25259f95035a83
-
Size
534KB
-
Sample
230401-ehzblafg76
-
MD5
3e4b1cdfb90f0238fd33500150fb83b9
-
SHA1
bc2b2aee028d5ff2742978480344c96a79aab9ff
-
SHA256
0d627f91d590e18b45b2a3601abab72edeb3ddbd1c22056cfc25259f95035a83
-
SHA512
b2b475791055425ee326038162d08deb407c7ab8a223c88eb585dd85ff8f9f67f3ed859244ee5e849155a971d2c391da3260dca20ff880d6f8625f18adc1a047
-
SSDEEP
12288:BMrRy90WRRaUSe2gCz2bPWe6pjXKQC1wBW/9e:4ylRRa8CzuPpyjXKQww41e
Static task
static1
Behavioral task
behavioral1
Sample
0d627f91d590e18b45b2a3601abab72edeb3ddbd1c22056cfc25259f95035a83.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
0d627f91d590e18b45b2a3601abab72edeb3ddbd1c22056cfc25259f95035a83
-
Size
534KB
-
MD5
3e4b1cdfb90f0238fd33500150fb83b9
-
SHA1
bc2b2aee028d5ff2742978480344c96a79aab9ff
-
SHA256
0d627f91d590e18b45b2a3601abab72edeb3ddbd1c22056cfc25259f95035a83
-
SHA512
b2b475791055425ee326038162d08deb407c7ab8a223c88eb585dd85ff8f9f67f3ed859244ee5e849155a971d2c391da3260dca20ff880d6f8625f18adc1a047
-
SSDEEP
12288:BMrRy90WRRaUSe2gCz2bPWe6pjXKQC1wBW/9e:4ylRRa8CzuPpyjXKQww41e
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-