General
-
Target
2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7
-
Size
529KB
-
Sample
230402-lgr98agh7t
-
MD5
3c5aa3b17a3d9a013aa7f0287f5c8c27
-
SHA1
cce8ccd6ef820ab32beae068b9b123858aaead44
-
SHA256
2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7
-
SHA512
7b18205fde082c3d3bf63a88a904b03125193fc51ee9b83bd47175e4d1778e7e7dae3683441f579a714058e5c088388528365dc5a65df1d6c560bab14a9dccfb
-
SSDEEP
12288:kMrmy90sja8tKnqsDmbI5guWGeKTDRzlTebCHYoMAN3k6K:ayb8nbZoGeODRZTdh3kD
Static task
static1
Behavioral task
behavioral1
Sample
2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7
-
Size
529KB
-
MD5
3c5aa3b17a3d9a013aa7f0287f5c8c27
-
SHA1
cce8ccd6ef820ab32beae068b9b123858aaead44
-
SHA256
2296933771f24668ddfc8fbd1ffe9e6d3000679d53f1f049fdaa89a53e8e18d7
-
SHA512
7b18205fde082c3d3bf63a88a904b03125193fc51ee9b83bd47175e4d1778e7e7dae3683441f579a714058e5c088388528365dc5a65df1d6c560bab14a9dccfb
-
SSDEEP
12288:kMrmy90sja8tKnqsDmbI5guWGeKTDRzlTebCHYoMAN3k6K:ayb8nbZoGeODRZTdh3kD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-