General
-
Target
6fd7cdbfffea021baf8e2b7be6fa7ef35afefec8e1a1d2c87229c1d8233679f4
-
Size
529KB
-
Sample
230401-jvr59sab7w
-
MD5
8c72f374f7ce19b7cdd5149b0d2ca9b5
-
SHA1
d90cc924aa72f4f7052a3f6bf97ba63ee1303b49
-
SHA256
6fd7cdbfffea021baf8e2b7be6fa7ef35afefec8e1a1d2c87229c1d8233679f4
-
SHA512
73236e11fbbeff48f31da0e67df35c3e82ee3191254c10fd9c9a61789db9f7f48a2fb6bcc4537d606ee3014eb8941036316ab57b91a0de6a33a6a15f21ab0de4
-
SSDEEP
12288:jMrAy907x1lnHLmd8Qz9dmwbrG4nFrg5IRY:3y8b1HK5mKZFLRY
Static task
static1
Behavioral task
behavioral1
Sample
6fd7cdbfffea021baf8e2b7be6fa7ef35afefec8e1a1d2c87229c1d8233679f4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
6fd7cdbfffea021baf8e2b7be6fa7ef35afefec8e1a1d2c87229c1d8233679f4
-
Size
529KB
-
MD5
8c72f374f7ce19b7cdd5149b0d2ca9b5
-
SHA1
d90cc924aa72f4f7052a3f6bf97ba63ee1303b49
-
SHA256
6fd7cdbfffea021baf8e2b7be6fa7ef35afefec8e1a1d2c87229c1d8233679f4
-
SHA512
73236e11fbbeff48f31da0e67df35c3e82ee3191254c10fd9c9a61789db9f7f48a2fb6bcc4537d606ee3014eb8941036316ab57b91a0de6a33a6a15f21ab0de4
-
SSDEEP
12288:jMrAy907x1lnHLmd8Qz9dmwbrG4nFrg5IRY:3y8b1HK5mKZFLRY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-