General
-
Target
585a043627ec79fd008849d9ad925eee0526a649dd4ca9b749addf1267ff2d61
-
Size
529KB
-
Sample
230402-khvlasfd86
-
MD5
02405b7afcff1b7dbb87487a44746593
-
SHA1
2580ffe4eb1d4d025bd2dca84836c0f38a09ec07
-
SHA256
585a043627ec79fd008849d9ad925eee0526a649dd4ca9b749addf1267ff2d61
-
SHA512
e0a6b69ab20667b17cc27a1db37266db82641b8251a9844c050300a7ea0397111bd439fc5eb5e8fda3cee2063145743075a2b9b0015b3d2897dd20113d88b5ed
-
SSDEEP
12288:+MrUy90Sihi1ZmDl9YESD6AKg/Lzd9Nk:OySeZAbSDlLzdfk
Static task
static1
Behavioral task
behavioral1
Sample
585a043627ec79fd008849d9ad925eee0526a649dd4ca9b749addf1267ff2d61.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
585a043627ec79fd008849d9ad925eee0526a649dd4ca9b749addf1267ff2d61
-
Size
529KB
-
MD5
02405b7afcff1b7dbb87487a44746593
-
SHA1
2580ffe4eb1d4d025bd2dca84836c0f38a09ec07
-
SHA256
585a043627ec79fd008849d9ad925eee0526a649dd4ca9b749addf1267ff2d61
-
SHA512
e0a6b69ab20667b17cc27a1db37266db82641b8251a9844c050300a7ea0397111bd439fc5eb5e8fda3cee2063145743075a2b9b0015b3d2897dd20113d88b5ed
-
SSDEEP
12288:+MrUy90Sihi1ZmDl9YESD6AKg/Lzd9Nk:OySeZAbSDlLzdfk
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-