General
-
Target
3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da
-
Size
529KB
-
Sample
230401-jj6vaaab2y
-
MD5
3fa0829a943bc10f93ce0e8f4aa01e3d
-
SHA1
0db1ac3e5aa156f79a8963a5ba38d4d52077ff15
-
SHA256
3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da
-
SHA512
c356e2f6f2f0bca273ecc6649f4d0e2e85c6d269e737341b4906394a1583ff2fad04d62f5e1e4424ef3450e9d22aae084f07c3dada89f025ac08da2a23c3adcc
-
SSDEEP
12288:eMrEy902HRyawK05Qalg0eqESBJgo0Q9c0zmySwPDIvX6P:myTh053lg0t/IeSRiP
Static task
static1
Behavioral task
behavioral1
Sample
3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da
-
Size
529KB
-
MD5
3fa0829a943bc10f93ce0e8f4aa01e3d
-
SHA1
0db1ac3e5aa156f79a8963a5ba38d4d52077ff15
-
SHA256
3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da
-
SHA512
c356e2f6f2f0bca273ecc6649f4d0e2e85c6d269e737341b4906394a1583ff2fad04d62f5e1e4424ef3450e9d22aae084f07c3dada89f025ac08da2a23c3adcc
-
SSDEEP
12288:eMrEy902HRyawK05Qalg0eqESBJgo0Q9c0zmySwPDIvX6P:myTh053lg0t/IeSRiP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-