General
-
Target
8d2ad265a0abfe64f7518cad242ac28caa423f000c0a6386fd8d2d51b8cf6e02
-
Size
522KB
-
Sample
230403-1y43nsfg85
-
MD5
c22db0bb395594a2dd80d56bb07594a0
-
SHA1
d4efcd58d5467196a99c4c55f54bef0c9a06d71a
-
SHA256
8d2ad265a0abfe64f7518cad242ac28caa423f000c0a6386fd8d2d51b8cf6e02
-
SHA512
95bdd341dc5917a1f32eb71803ce4c837488687cc81c1b0abc50d2978725c0611fb5874e3502d2e9fef6dc00ab8180681d12022706d56ccbf9090982cf3f43f9
-
SSDEEP
12288:WMrLy90gJcXsxEEpPef7EfrwcVhC+J6foYnMZGx:ty3s0pmDEfrVY+eHx
Static task
static1
Behavioral task
behavioral1
Sample
8d2ad265a0abfe64f7518cad242ac28caa423f000c0a6386fd8d2d51b8cf6e02.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
8d2ad265a0abfe64f7518cad242ac28caa423f000c0a6386fd8d2d51b8cf6e02
-
Size
522KB
-
MD5
c22db0bb395594a2dd80d56bb07594a0
-
SHA1
d4efcd58d5467196a99c4c55f54bef0c9a06d71a
-
SHA256
8d2ad265a0abfe64f7518cad242ac28caa423f000c0a6386fd8d2d51b8cf6e02
-
SHA512
95bdd341dc5917a1f32eb71803ce4c837488687cc81c1b0abc50d2978725c0611fb5874e3502d2e9fef6dc00ab8180681d12022706d56ccbf9090982cf3f43f9
-
SSDEEP
12288:WMrLy90gJcXsxEEpPef7EfrwcVhC+J6foYnMZGx:ty3s0pmDEfrVY+eHx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-