General
-
Target
984f564785748ca0236a19be7cdc2a50c9b3b9020c960091cf56fd2f46614b94
-
Size
529KB
-
Sample
230402-lkcc6sgh8v
-
MD5
a5c6008cc918bdbd0e43aea316557252
-
SHA1
57c093f42ff287cded7ae11ae1f391d697ad001c
-
SHA256
984f564785748ca0236a19be7cdc2a50c9b3b9020c960091cf56fd2f46614b94
-
SHA512
452217c1312d4e48a717d16444aeb3dd96cdedbcc2cb00ec41df8cb59831cb2a66599152a4d2d699121ec422ba0ee062d52284162140ea9f872aaff72a7ad6ed
-
SSDEEP
12288:JMroy90ohRwqojAx1R11AkWzCSMdW2xfg+Skct5SAKQJ:9yXhfRAkWzdcNBc/mi
Static task
static1
Behavioral task
behavioral1
Sample
984f564785748ca0236a19be7cdc2a50c9b3b9020c960091cf56fd2f46614b94.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
984f564785748ca0236a19be7cdc2a50c9b3b9020c960091cf56fd2f46614b94
-
Size
529KB
-
MD5
a5c6008cc918bdbd0e43aea316557252
-
SHA1
57c093f42ff287cded7ae11ae1f391d697ad001c
-
SHA256
984f564785748ca0236a19be7cdc2a50c9b3b9020c960091cf56fd2f46614b94
-
SHA512
452217c1312d4e48a717d16444aeb3dd96cdedbcc2cb00ec41df8cb59831cb2a66599152a4d2d699121ec422ba0ee062d52284162140ea9f872aaff72a7ad6ed
-
SSDEEP
12288:JMroy90ohRwqojAx1R11AkWzCSMdW2xfg+Skct5SAKQJ:9yXhfRAkWzdcNBc/mi
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-