General
-
Target
cde79ccd567208f34feab8c3adb57c490c38d19c08bfd9ee0421c115dda6b83c
-
Size
522KB
-
Sample
230403-1b13hacf4x
-
MD5
1f7049fec0de8df73f585d32242e52f6
-
SHA1
e80ed30d4527c6a790fe0ed2a2eaf3a3ea1d9dc8
-
SHA256
cde79ccd567208f34feab8c3adb57c490c38d19c08bfd9ee0421c115dda6b83c
-
SHA512
42a179759fc60a4074a220a460d66ac68e79c8f422f1d8689cb1854e8e9257093816a874eb86f69baa3896ac100cfd5e1ac56381e5f759ac92b8c81fd9de801d
-
SSDEEP
12288:OMrLy90FjMwNEWYJPv8ze44azWHw5Xv8Je0h2x:9yigmcUzX4jHT5C
Static task
static1
Behavioral task
behavioral1
Sample
cde79ccd567208f34feab8c3adb57c490c38d19c08bfd9ee0421c115dda6b83c.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
cde79ccd567208f34feab8c3adb57c490c38d19c08bfd9ee0421c115dda6b83c
-
Size
522KB
-
MD5
1f7049fec0de8df73f585d32242e52f6
-
SHA1
e80ed30d4527c6a790fe0ed2a2eaf3a3ea1d9dc8
-
SHA256
cde79ccd567208f34feab8c3adb57c490c38d19c08bfd9ee0421c115dda6b83c
-
SHA512
42a179759fc60a4074a220a460d66ac68e79c8f422f1d8689cb1854e8e9257093816a874eb86f69baa3896ac100cfd5e1ac56381e5f759ac92b8c81fd9de801d
-
SSDEEP
12288:OMrLy90FjMwNEWYJPv8ze44azWHw5Xv8Je0h2x:9yigmcUzX4jHT5C
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-