General
-
Target
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd
-
Size
534KB
-
Sample
230401-evl7ssfh52
-
MD5
4cccd2d13c5f3b787b3d92f61d827eb4
-
SHA1
270c3e061d718b10a63bcf53d3136cc2522d9ca9
-
SHA256
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd
-
SHA512
c00f851446754500af0ec68ed53188df1960da58f4775f903d723e3e15b924fdb9f06a9a2c9e2440cece37d078965a2a47945e0729dcd90cce6bca4e64ad4035
-
SSDEEP
12288:PMr/y90k/ajz0ZSH5rSPRPz6bKWY2rhZXJnbKp6:4yn/ajnwPzyK/2Vb86
Static task
static1
Behavioral task
behavioral1
Sample
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd
-
Size
534KB
-
MD5
4cccd2d13c5f3b787b3d92f61d827eb4
-
SHA1
270c3e061d718b10a63bcf53d3136cc2522d9ca9
-
SHA256
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd
-
SHA512
c00f851446754500af0ec68ed53188df1960da58f4775f903d723e3e15b924fdb9f06a9a2c9e2440cece37d078965a2a47945e0729dcd90cce6bca4e64ad4035
-
SSDEEP
12288:PMr/y90k/ajz0ZSH5rSPRPz6bKWY2rhZXJnbKp6:4yn/ajnwPzyK/2Vb86
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-