General
-
Target
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61
-
Size
666KB
-
Sample
230403-eyr78acf82
-
MD5
e879691309289faacbd504ff59710bd5
-
SHA1
1964a5ce2f610a87a9e9715fd1e045d20999e4fe
-
SHA256
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61
-
SHA512
fbc35127224800b7cf411d62d2b9db23559fe7a7fdddff4fa8bf9ee50ce304d081541cf692635acf50a9ca617dc88058880fd6816d0356b7b73537ff076637b6
-
SSDEEP
12288:YMrmy90i6lwAsnTNjNuUXE6i7mKrH4TSapjOhhrUqjH/wBBrL04V:uy56CLnTGUjrKrH4TihhrDfwBBrLf
Static task
static1
Behavioral task
behavioral1
Sample
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61
-
Size
666KB
-
MD5
e879691309289faacbd504ff59710bd5
-
SHA1
1964a5ce2f610a87a9e9715fd1e045d20999e4fe
-
SHA256
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61
-
SHA512
fbc35127224800b7cf411d62d2b9db23559fe7a7fdddff4fa8bf9ee50ce304d081541cf692635acf50a9ca617dc88058880fd6816d0356b7b73537ff076637b6
-
SSDEEP
12288:YMrmy90i6lwAsnTNjNuUXE6i7mKrH4TSapjOhhrUqjH/wBBrL04V:uy56CLnTGUjrKrH4TihhrDfwBBrLf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-