General
-
Target
161599339ed2d670f12fe567e6eb755563f649202e10ad628224238f0dfbc8b5
-
Size
666KB
-
Sample
230402-263p9abe58
-
MD5
ed590aff6d624d958951405db0d03b86
-
SHA1
7eec1e9273b2f8fc47f59b61641fa4a38ee091da
-
SHA256
161599339ed2d670f12fe567e6eb755563f649202e10ad628224238f0dfbc8b5
-
SHA512
f70459b09e341df97c611ce8908cde7ca558a67bb17bbc4c7f07fca1e4831fb8eeca072443d40a9164b7432c8e09879d816c5416e6fa2ce4a784fa086d2b3907
-
SSDEEP
12288:RMrfy90wKOQk3pIU6kko8uVi4EN5Y67groRNPpBWFP4YGrUd4C/wzgTWVeY+uuBz:iyaeBTT8AEN5bgmHi4rHcwUSlYqd43b
Static task
static1
Behavioral task
behavioral1
Sample
161599339ed2d670f12fe567e6eb755563f649202e10ad628224238f0dfbc8b5.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
161599339ed2d670f12fe567e6eb755563f649202e10ad628224238f0dfbc8b5
-
Size
666KB
-
MD5
ed590aff6d624d958951405db0d03b86
-
SHA1
7eec1e9273b2f8fc47f59b61641fa4a38ee091da
-
SHA256
161599339ed2d670f12fe567e6eb755563f649202e10ad628224238f0dfbc8b5
-
SHA512
f70459b09e341df97c611ce8908cde7ca558a67bb17bbc4c7f07fca1e4831fb8eeca072443d40a9164b7432c8e09879d816c5416e6fa2ce4a784fa086d2b3907
-
SSDEEP
12288:RMrfy90wKOQk3pIU6kko8uVi4EN5Y67groRNPpBWFP4YGrUd4C/wzgTWVeY+uuBz:iyaeBTT8AEN5bgmHi4rHcwUSlYqd43b
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-