General
-
Target
d77755cc0f9edd8c7e8181c51aa09e01d1500caaa1952fe8a1f24cad0329f365
-
Size
530KB
-
Sample
230402-abx3qsde84
-
MD5
3a417edb2f359cc1e620d98acecf3955
-
SHA1
ae353cb9ce2b6a752ce3f1edc0b8cc50dc953ae2
-
SHA256
d77755cc0f9edd8c7e8181c51aa09e01d1500caaa1952fe8a1f24cad0329f365
-
SHA512
066972084a0b5d1eb085be944f714260afcc2f26acee9e95cfb48c4ed3d8fdf79f11b209d0dcf720636b0dda6e99bfb6fdc65ef94565ff9557cc42ef1ed2a6da
-
SSDEEP
12288:TMrQy90va6wlk0LLDqqjoJarrYSFY3f5KXa/aPJ3RWzUh4:3y6a623D3jMtzANPJ3RWzUh4
Static task
static1
Behavioral task
behavioral1
Sample
d77755cc0f9edd8c7e8181c51aa09e01d1500caaa1952fe8a1f24cad0329f365.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
d77755cc0f9edd8c7e8181c51aa09e01d1500caaa1952fe8a1f24cad0329f365
-
Size
530KB
-
MD5
3a417edb2f359cc1e620d98acecf3955
-
SHA1
ae353cb9ce2b6a752ce3f1edc0b8cc50dc953ae2
-
SHA256
d77755cc0f9edd8c7e8181c51aa09e01d1500caaa1952fe8a1f24cad0329f365
-
SHA512
066972084a0b5d1eb085be944f714260afcc2f26acee9e95cfb48c4ed3d8fdf79f11b209d0dcf720636b0dda6e99bfb6fdc65ef94565ff9557cc42ef1ed2a6da
-
SSDEEP
12288:TMrQy90va6wlk0LLDqqjoJarrYSFY3f5KXa/aPJ3RWzUh4:3y6a623D3jMtzANPJ3RWzUh4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-