General
-
Target
0ea754b35774ed7a6d9476f2fd38ce790c5e8ca866e687188cd20bc9d389c00c
-
Size
659KB
-
Sample
230402-mqj6msfh66
-
MD5
7cb6ce543a6b416c01046d8ef3e228fd
-
SHA1
6ccc13e83f0ddc8166dc030d1c1bc87ff2aeb651
-
SHA256
0ea754b35774ed7a6d9476f2fd38ce790c5e8ca866e687188cd20bc9d389c00c
-
SHA512
af802fc3c6f04edf65a90c863a051d252f99942365ae25b6c6f00f84253c152c0f74b3564590f4f64e23b1ff796e39030229055da0c29f8dd0e8a7280059017e
-
SSDEEP
12288:+Mr6y90PPBeI0vwA/5VY3Km1AFjlRgNeaOKvXw6k7:4yyPTo/4d1AFO5OKvA77
Static task
static1
Behavioral task
behavioral1
Sample
0ea754b35774ed7a6d9476f2fd38ce790c5e8ca866e687188cd20bc9d389c00c.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
0ea754b35774ed7a6d9476f2fd38ce790c5e8ca866e687188cd20bc9d389c00c
-
Size
659KB
-
MD5
7cb6ce543a6b416c01046d8ef3e228fd
-
SHA1
6ccc13e83f0ddc8166dc030d1c1bc87ff2aeb651
-
SHA256
0ea754b35774ed7a6d9476f2fd38ce790c5e8ca866e687188cd20bc9d389c00c
-
SHA512
af802fc3c6f04edf65a90c863a051d252f99942365ae25b6c6f00f84253c152c0f74b3564590f4f64e23b1ff796e39030229055da0c29f8dd0e8a7280059017e
-
SSDEEP
12288:+Mr6y90PPBeI0vwA/5VY3Km1AFjlRgNeaOKvXw6k7:4yyPTo/4d1AFO5OKvA77
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-