General
-
Target
032b5fb9ec81338706053d20879f68e34a9cffd327856a06b6b2518c66701d26
-
Size
667KB
-
Sample
230402-2rs79sbc25
-
MD5
e35984ead89e5864c5f3ebc9196fceca
-
SHA1
3cae13b5b5be581bcfdb74f7dab687eeb73e9d31
-
SHA256
032b5fb9ec81338706053d20879f68e34a9cffd327856a06b6b2518c66701d26
-
SHA512
01b07ae806c95d52d4871898cab284be91e391ea6bda52eca8c82efeb47b24963560cf7135421485ea91849e31d2c3e5ea5e01cf076bcca493184775c3cdc295
-
SSDEEP
12288:TMrYy90hKhRn0zK3imDXhAdVXhWxFqWW1hic2VUYfD+rU78a/wpdExQsv:PyVfYKSsX5qWW1hic2PyrJEwD3M
Static task
static1
Behavioral task
behavioral1
Sample
032b5fb9ec81338706053d20879f68e34a9cffd327856a06b6b2518c66701d26.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
032b5fb9ec81338706053d20879f68e34a9cffd327856a06b6b2518c66701d26
-
Size
667KB
-
MD5
e35984ead89e5864c5f3ebc9196fceca
-
SHA1
3cae13b5b5be581bcfdb74f7dab687eeb73e9d31
-
SHA256
032b5fb9ec81338706053d20879f68e34a9cffd327856a06b6b2518c66701d26
-
SHA512
01b07ae806c95d52d4871898cab284be91e391ea6bda52eca8c82efeb47b24963560cf7135421485ea91849e31d2c3e5ea5e01cf076bcca493184775c3cdc295
-
SSDEEP
12288:TMrYy90hKhRn0zK3imDXhAdVXhWxFqWW1hic2VUYfD+rU78a/wpdExQsv:PyVfYKSsX5qWW1hic2PyrJEwD3M
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-