General
-
Target
19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756
-
Size
667KB
-
Sample
230402-rwgd6aab3s
-
MD5
49e80828e0dc6112327ee85a4e7be939
-
SHA1
f269752fd14d8e4cb78d80c5add75bbee60b260d
-
SHA256
19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756
-
SHA512
e1bfd41eac6c3c7877db4e14c57383ea0ac01ffd60fcaf04168fc4ec613daebb62f7b27b44bdb74dbbd44986fca3bda12cda65034f9a13ee6290ee9bd26675e2
-
SSDEEP
12288:9MrKy90ASi5DBqqWwJkGexBAk1g3P+U6zWWqI/CLThHtLmIqBCC3/tLH:7ywi5D0qWwVudefwzobtCIeCA7
Static task
static1
Behavioral task
behavioral1
Sample
19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756
-
Size
667KB
-
MD5
49e80828e0dc6112327ee85a4e7be939
-
SHA1
f269752fd14d8e4cb78d80c5add75bbee60b260d
-
SHA256
19b855788a90190327fac4fa30a09559089f6208a7d09ac2351302dd146ca756
-
SHA512
e1bfd41eac6c3c7877db4e14c57383ea0ac01ffd60fcaf04168fc4ec613daebb62f7b27b44bdb74dbbd44986fca3bda12cda65034f9a13ee6290ee9bd26675e2
-
SSDEEP
12288:9MrKy90ASi5DBqqWwJkGexBAk1g3P+U6zWWqI/CLThHtLmIqBCC3/tLH:7ywi5D0qWwVudefwzobtCIeCA7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-