General
-
Target
f1bae2be370bcafc4f69563572bf3e506709bfd6da86898834f8a683f31d1be3
-
Size
660KB
-
Sample
230402-ljhhssff45
-
MD5
1893eec3d4e3b7f29270fbfedeab07b0
-
SHA1
8ddf93d348d9ba9f579df7d3656998fda16ebdda
-
SHA256
f1bae2be370bcafc4f69563572bf3e506709bfd6da86898834f8a683f31d1be3
-
SHA512
bf29fd5a3a4b0f97ebf2b5024a3ac6c86f581c53bfac8680219a230cdc5588a5ef0c1b1e671f844fee4729e450c55a78b80037f3bd644ce0e215783bf70a2e4b
-
SSDEEP
12288:ZMray90+/+Ebwvy2QrulTBvu0zxAcj9FRlRe6Q6ife5Mo:fyp/+EbWyjeBAgFBQ6i2
Static task
static1
Behavioral task
behavioral1
Sample
f1bae2be370bcafc4f69563572bf3e506709bfd6da86898834f8a683f31d1be3.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
f1bae2be370bcafc4f69563572bf3e506709bfd6da86898834f8a683f31d1be3
-
Size
660KB
-
MD5
1893eec3d4e3b7f29270fbfedeab07b0
-
SHA1
8ddf93d348d9ba9f579df7d3656998fda16ebdda
-
SHA256
f1bae2be370bcafc4f69563572bf3e506709bfd6da86898834f8a683f31d1be3
-
SHA512
bf29fd5a3a4b0f97ebf2b5024a3ac6c86f581c53bfac8680219a230cdc5588a5ef0c1b1e671f844fee4729e450c55a78b80037f3bd644ce0e215783bf70a2e4b
-
SSDEEP
12288:ZMray90+/+Ebwvy2QrulTBvu0zxAcj9FRlRe6Q6ife5Mo:fyp/+EbWyjeBAgFBQ6i2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-