General
-
Target
c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b
-
Size
537KB
-
Sample
230402-1w3f3acb8z
-
MD5
0b67d16a9d76c20a3ce121cff86916d6
-
SHA1
990cb47f7b2d423f84456fe4c758e8159466dc02
-
SHA256
c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b
-
SHA512
540a1c29ec324ba43bb8bee4ba3aec67a167f592299165fe770e6bb1097770332d86a7a774d60a52af36849021c006d566c21ceb79a001156a08b652367b3082
-
SSDEEP
12288:OMroy90eZoNTvPWbEw0AUP/HHwUekvo9QRmk0vi:6ydUTvuIAInwWfRmkt
Static task
static1
Behavioral task
behavioral1
Sample
c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b
-
Size
537KB
-
MD5
0b67d16a9d76c20a3ce121cff86916d6
-
SHA1
990cb47f7b2d423f84456fe4c758e8159466dc02
-
SHA256
c345f37fe3545a8dc4372d47b648108d734331a8365de35d312b847730566b3b
-
SHA512
540a1c29ec324ba43bb8bee4ba3aec67a167f592299165fe770e6bb1097770332d86a7a774d60a52af36849021c006d566c21ceb79a001156a08b652367b3082
-
SSDEEP
12288:OMroy90eZoNTvPWbEw0AUP/HHwUekvo9QRmk0vi:6ydUTvuIAInwWfRmkt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-