General
-
Target
916ab078ae696a8f3be65b65cf633701f0c7850e57a1d4033a8046d1a71f58a8
-
Size
536KB
-
Sample
230402-wj1pgshf89
-
MD5
221f6513986e6d17c4537f0f6be8f252
-
SHA1
69366381cc409cbe28e59b82f9ed2b7824692a49
-
SHA256
916ab078ae696a8f3be65b65cf633701f0c7850e57a1d4033a8046d1a71f58a8
-
SHA512
8f8dbf56a4ff38720474e7b2ca4dc9544c9ee1f722819841d4d591c024cabc141c4e7224b293c43bf0853b3d31f97412369a6176cfe4409dca56edd38de96ae2
-
SSDEEP
12288:UMrhy90sgDPhkKWBO7T22q4guopRNEzieeayLks33Jn8vmPhYs:ty1QPhkKoO7Tn0pRNEPjyY43ue5
Static task
static1
Behavioral task
behavioral1
Sample
916ab078ae696a8f3be65b65cf633701f0c7850e57a1d4033a8046d1a71f58a8.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
916ab078ae696a8f3be65b65cf633701f0c7850e57a1d4033a8046d1a71f58a8
-
Size
536KB
-
MD5
221f6513986e6d17c4537f0f6be8f252
-
SHA1
69366381cc409cbe28e59b82f9ed2b7824692a49
-
SHA256
916ab078ae696a8f3be65b65cf633701f0c7850e57a1d4033a8046d1a71f58a8
-
SHA512
8f8dbf56a4ff38720474e7b2ca4dc9544c9ee1f722819841d4d591c024cabc141c4e7224b293c43bf0853b3d31f97412369a6176cfe4409dca56edd38de96ae2
-
SSDEEP
12288:UMrhy90sgDPhkKWBO7T22q4guopRNEzieeayLks33Jn8vmPhYs:ty1QPhkKoO7Tn0pRNEPjyY43ue5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-