General
-
Target
e50d3f6f152ec595937345176854e5d08a6c124288494e3705fba644844e8517
-
Size
659KB
-
Sample
230402-kl9vdsfd97
-
MD5
077fadb7836387faf27e17dad4c96f55
-
SHA1
d2d53fbe533b0b034a4c5147cd331083f469d0de
-
SHA256
e50d3f6f152ec595937345176854e5d08a6c124288494e3705fba644844e8517
-
SHA512
6b6f3d7643c7ee8387d4d7688b916586b3a9f64641c4e8d4c1f204605d6896fc6a27eabd7f1e461d655d511ab1f038b9c9b0717d018b61b6a0ffe4773b9226b1
-
SSDEEP
12288:LMrAy90B/nWxjo2q+QxkOWTVDbxrXDZ72zFjlR4Z74uyYDVJ3E:Py2QEvkp3QFViO
Static task
static1
Behavioral task
behavioral1
Sample
e50d3f6f152ec595937345176854e5d08a6c124288494e3705fba644844e8517.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
e50d3f6f152ec595937345176854e5d08a6c124288494e3705fba644844e8517
-
Size
659KB
-
MD5
077fadb7836387faf27e17dad4c96f55
-
SHA1
d2d53fbe533b0b034a4c5147cd331083f469d0de
-
SHA256
e50d3f6f152ec595937345176854e5d08a6c124288494e3705fba644844e8517
-
SHA512
6b6f3d7643c7ee8387d4d7688b916586b3a9f64641c4e8d4c1f204605d6896fc6a27eabd7f1e461d655d511ab1f038b9c9b0717d018b61b6a0ffe4773b9226b1
-
SSDEEP
12288:LMrAy90B/nWxjo2q+QxkOWTVDbxrXDZ72zFjlR4Z74uyYDVJ3E:Py2QEvkp3QFViO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-