General
-
Target
d46b621ea1f2ec13cc3fe7df719475a4f26fc1a310a414e7dbee524e87654abd
-
Size
530KB
-
Sample
230401-p1wzasaa94
-
MD5
864019cb907821ba044047bd724e798a
-
SHA1
7c275cb9c65a5da39ae8dca277f76c6b75458e32
-
SHA256
d46b621ea1f2ec13cc3fe7df719475a4f26fc1a310a414e7dbee524e87654abd
-
SHA512
528cd83a493831a7bc8981289b82c00bd05a1761ff20abafd9d99346d2c6b9b5f3c4785993d8aac09847a17f077e3379a2dd4d77348982e417f2db015a672300
-
SSDEEP
12288:0MrMy90x9i5QuanOb9ud6FJSsEXX9o0ctCFHJQo:4y4AfwUfEXNqqpj
Static task
static1
Behavioral task
behavioral1
Sample
d46b621ea1f2ec13cc3fe7df719475a4f26fc1a310a414e7dbee524e87654abd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
d46b621ea1f2ec13cc3fe7df719475a4f26fc1a310a414e7dbee524e87654abd
-
Size
530KB
-
MD5
864019cb907821ba044047bd724e798a
-
SHA1
7c275cb9c65a5da39ae8dca277f76c6b75458e32
-
SHA256
d46b621ea1f2ec13cc3fe7df719475a4f26fc1a310a414e7dbee524e87654abd
-
SHA512
528cd83a493831a7bc8981289b82c00bd05a1761ff20abafd9d99346d2c6b9b5f3c4785993d8aac09847a17f077e3379a2dd4d77348982e417f2db015a672300
-
SSDEEP
12288:0MrMy90x9i5QuanOb9ud6FJSsEXX9o0ctCFHJQo:4y4AfwUfEXNqqpj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-