General
-
Target
924cd72cdc07631eec4062c86efef331535adcda099816e87d9930905c76f243
-
Size
530KB
-
Sample
230402-aq2pgaeh91
-
MD5
e6b9448ec13901b094fa580e680b79dc
-
SHA1
01456c50d366bae7bb7a52d52344b388ff226bc0
-
SHA256
924cd72cdc07631eec4062c86efef331535adcda099816e87d9930905c76f243
-
SHA512
bb2e381de34c84d12eb318965f5dfe2290cae979f7a7dbfeee637f2158b3e521f0b9fbe1b4b448f82eaded32d4df34cbef11f4fa8f1d3d7ca3aea345d55bad23
-
SSDEEP
12288:qMrsy90Y06t0B75G48VZW1NM+2f5KXa/cmttgM7L4n9T:Kyw9kI1NSAzmttX7L4n9T
Static task
static1
Behavioral task
behavioral1
Sample
924cd72cdc07631eec4062c86efef331535adcda099816e87d9930905c76f243.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
924cd72cdc07631eec4062c86efef331535adcda099816e87d9930905c76f243
-
Size
530KB
-
MD5
e6b9448ec13901b094fa580e680b79dc
-
SHA1
01456c50d366bae7bb7a52d52344b388ff226bc0
-
SHA256
924cd72cdc07631eec4062c86efef331535adcda099816e87d9930905c76f243
-
SHA512
bb2e381de34c84d12eb318965f5dfe2290cae979f7a7dbfeee637f2158b3e521f0b9fbe1b4b448f82eaded32d4df34cbef11f4fa8f1d3d7ca3aea345d55bad23
-
SSDEEP
12288:qMrsy90Y06t0B75G48VZW1NM+2f5KXa/cmttgM7L4n9T:Kyw9kI1NSAzmttX7L4n9T
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-