General
-
Target
cda6e4c98c0a31af44cb1f4b17b283a0136e933dd8dc1db1780fbc919078bea6
-
Size
658KB
-
Sample
230401-shetvaag53
-
MD5
722a5b6efe86c3476be96c06248f8923
-
SHA1
e054cd8b81453ac93820feb15fa73d61f9875248
-
SHA256
cda6e4c98c0a31af44cb1f4b17b283a0136e933dd8dc1db1780fbc919078bea6
-
SHA512
c4bf5ef112624d55f90b9cb5ae3d15db3b96b4722d64a180309c4c3ba7eb81085dca3ca3a04884ace8dd72cb94fd8abda5d57b38a8ad1bb9ecce18f51cb7fb0c
-
SSDEEP
12288:4MrEy90TKRuMrHSs/63Tvth2IexntjStXE/Kj6QoqBiVLIx3fl:cy7uMbSs/6DP2ZtjMDGQDALIj
Static task
static1
Behavioral task
behavioral1
Sample
cda6e4c98c0a31af44cb1f4b17b283a0136e933dd8dc1db1780fbc919078bea6.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
cda6e4c98c0a31af44cb1f4b17b283a0136e933dd8dc1db1780fbc919078bea6
-
Size
658KB
-
MD5
722a5b6efe86c3476be96c06248f8923
-
SHA1
e054cd8b81453ac93820feb15fa73d61f9875248
-
SHA256
cda6e4c98c0a31af44cb1f4b17b283a0136e933dd8dc1db1780fbc919078bea6
-
SHA512
c4bf5ef112624d55f90b9cb5ae3d15db3b96b4722d64a180309c4c3ba7eb81085dca3ca3a04884ace8dd72cb94fd8abda5d57b38a8ad1bb9ecce18f51cb7fb0c
-
SSDEEP
12288:4MrEy90TKRuMrHSs/63Tvth2IexntjStXE/Kj6QoqBiVLIx3fl:cy7uMbSs/6DP2ZtjMDGQDALIj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-