General
-
Target
2232ef7a17f018dc8a6ce5e6ff31391f5b768348a1f643ee2b43db1f158cad45
-
Size
530KB
-
Sample
230401-tc9mpsba57
-
MD5
572d1fcaaee5932da0e32492f831b415
-
SHA1
335ca08dc69eb7938235bee91de172c023689323
-
SHA256
2232ef7a17f018dc8a6ce5e6ff31391f5b768348a1f643ee2b43db1f158cad45
-
SHA512
8c5bec306ee83fad3048c34bd0a53ad4e4fac39016f1879a8e5063ef6e1e66e8b69f6e9cc7d345f6acdc0d50113766ac9497b95e90391447462ab4937b83707f
-
SSDEEP
12288:fMrDy90vwEKRbKdGp5zDjMQzqB4QoMvvYJ0Hi3p:EywFKdKQHQQWzo+v9HSp
Static task
static1
Behavioral task
behavioral1
Sample
2232ef7a17f018dc8a6ce5e6ff31391f5b768348a1f643ee2b43db1f158cad45.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
2232ef7a17f018dc8a6ce5e6ff31391f5b768348a1f643ee2b43db1f158cad45
-
Size
530KB
-
MD5
572d1fcaaee5932da0e32492f831b415
-
SHA1
335ca08dc69eb7938235bee91de172c023689323
-
SHA256
2232ef7a17f018dc8a6ce5e6ff31391f5b768348a1f643ee2b43db1f158cad45
-
SHA512
8c5bec306ee83fad3048c34bd0a53ad4e4fac39016f1879a8e5063ef6e1e66e8b69f6e9cc7d345f6acdc0d50113766ac9497b95e90391447462ab4937b83707f
-
SSDEEP
12288:fMrDy90vwEKRbKdGp5zDjMQzqB4QoMvvYJ0Hi3p:EywFKdKQHQQWzo+v9HSp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-