General
-
Target
4f29f1b5ec6a188e679414d4dcfa8181ad6a7bdd40b74c5e946eb61d583c1ef6
-
Size
666KB
-
Sample
230402-wmjv5shg22
-
MD5
8a8551dcf782a9fffd88fa6305e93d96
-
SHA1
840c8082e03af55ceddc39018302e46985712d5c
-
SHA256
4f29f1b5ec6a188e679414d4dcfa8181ad6a7bdd40b74c5e946eb61d583c1ef6
-
SHA512
34f43259a5f3c8211f326d398f2e2f2a274958c1341e6082cdaa79e75b124facb1f6ef639f3eb0f1b716c8661bc4dd940db13b4da13ab287050f4c0e725b3076
-
SSDEEP
12288:BMrCy90x4al36oxoxqDJbFdk+Hy/XQhkFzEItXNxbB6a4LYawu9F:vy2Tl6owqDVFRQQhQQIRNxX4kaFr
Static task
static1
Behavioral task
behavioral1
Sample
4f29f1b5ec6a188e679414d4dcfa8181ad6a7bdd40b74c5e946eb61d583c1ef6.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
4f29f1b5ec6a188e679414d4dcfa8181ad6a7bdd40b74c5e946eb61d583c1ef6
-
Size
666KB
-
MD5
8a8551dcf782a9fffd88fa6305e93d96
-
SHA1
840c8082e03af55ceddc39018302e46985712d5c
-
SHA256
4f29f1b5ec6a188e679414d4dcfa8181ad6a7bdd40b74c5e946eb61d583c1ef6
-
SHA512
34f43259a5f3c8211f326d398f2e2f2a274958c1341e6082cdaa79e75b124facb1f6ef639f3eb0f1b716c8661bc4dd940db13b4da13ab287050f4c0e725b3076
-
SSDEEP
12288:BMrCy90x4al36oxoxqDJbFdk+Hy/XQhkFzEItXNxbB6a4LYawu9F:vy2Tl6owqDVFRQQhQQIRNxX4kaFr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-