General
-
Target
95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32
-
Size
659KB
-
Sample
230401-q56vqsbg4v
-
MD5
e8db902e73ef89a32af27d90f7c85036
-
SHA1
add72b2ecbb83f5120fb4ff75a7c59debfb917b2
-
SHA256
95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32
-
SHA512
23fa4d3d467b8ecbd8c65b2958c6122fbfbf48d6c1c34e96ac213c60543a37d442772b7b423cc8fcdd48b7a9d5c3d8b89367a010b96afbddb5b7036e8905a902
-
SSDEEP
12288:bMryy90pSqfL5Kk2O+B8XulUAXxbKjoQoqBijir/FCSIi3:tyySj5+XulpkEQDf9gi3
Static task
static1
Behavioral task
behavioral1
Sample
95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32
-
Size
659KB
-
MD5
e8db902e73ef89a32af27d90f7c85036
-
SHA1
add72b2ecbb83f5120fb4ff75a7c59debfb917b2
-
SHA256
95b2242287e89f4cf17569fc7b0645be8a3c26bc4dac84e39657bfb984f14f32
-
SHA512
23fa4d3d467b8ecbd8c65b2958c6122fbfbf48d6c1c34e96ac213c60543a37d442772b7b423cc8fcdd48b7a9d5c3d8b89367a010b96afbddb5b7036e8905a902
-
SSDEEP
12288:bMryy90pSqfL5Kk2O+B8XulUAXxbKjoQoqBijir/FCSIi3:tyySj5+XulpkEQDf9gi3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-