General
-
Target
7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b
-
Size
530KB
-
Sample
230402-hhfq2agd7t
-
MD5
b83545dbf659017b4b90a8c55320b912
-
SHA1
ee31c72d28c58cc78472448d84cbb2db806e7cce
-
SHA256
7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b
-
SHA512
6fa96ef741de79fa92cca80dfec2366f86bc87f944a1d2332b7b87a86f25235749b04cfc77aaa807f141d8ea366194675378c67d95bd684e8f9c200b5cf3f560
-
SSDEEP
12288:DMrSy906Vn8ApR3bCh/4VEwu0me+6ucjW+ogi:py/8Ap9bCN4V9vmDcGgi
Static task
static1
Behavioral task
behavioral1
Sample
7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b
-
Size
530KB
-
MD5
b83545dbf659017b4b90a8c55320b912
-
SHA1
ee31c72d28c58cc78472448d84cbb2db806e7cce
-
SHA256
7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b
-
SHA512
6fa96ef741de79fa92cca80dfec2366f86bc87f944a1d2332b7b87a86f25235749b04cfc77aaa807f141d8ea366194675378c67d95bd684e8f9c200b5cf3f560
-
SSDEEP
12288:DMrSy906Vn8ApR3bCh/4VEwu0me+6ucjW+ogi:py/8Ap9bCN4V9vmDcGgi
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-