General
-
Target
085d267b51c93d44f3ad791c261a1dd21f9f802455184f5125360082f1b96c15
-
Size
538KB
-
Sample
230403-d97avadh6t
-
MD5
6dec623b29fae6568ffb821d445a9065
-
SHA1
8387d37969a834082b528561ced9536aa19332bc
-
SHA256
085d267b51c93d44f3ad791c261a1dd21f9f802455184f5125360082f1b96c15
-
SHA512
6fd664a17d4b0890a234d2ee4d9b945a55d34612f9ef47971f8f271e404c63fc4466e4f2121792c0c9ad9613e93e7ff81817ffa25221c78a0302872a7907d5e9
-
SSDEEP
12288:RMriy90iv6vW5QSTy6flRgs4BGrU9LHVwBJohMA4V4IC6HC:LyX/ZRgLGrM1wUCA42P
Static task
static1
Behavioral task
behavioral1
Sample
085d267b51c93d44f3ad791c261a1dd21f9f802455184f5125360082f1b96c15.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
085d267b51c93d44f3ad791c261a1dd21f9f802455184f5125360082f1b96c15
-
Size
538KB
-
MD5
6dec623b29fae6568ffb821d445a9065
-
SHA1
8387d37969a834082b528561ced9536aa19332bc
-
SHA256
085d267b51c93d44f3ad791c261a1dd21f9f802455184f5125360082f1b96c15
-
SHA512
6fd664a17d4b0890a234d2ee4d9b945a55d34612f9ef47971f8f271e404c63fc4466e4f2121792c0c9ad9613e93e7ff81817ffa25221c78a0302872a7907d5e9
-
SSDEEP
12288:RMriy90iv6vW5QSTy6flRgs4BGrU9LHVwBJohMA4V4IC6HC:LyX/ZRgLGrM1wUCA42P
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-