General
-
Target
653c4cb04042e09d643efaa1bd1d15ea60285cfe57bb1ed1759b3d554d773ea8
-
Size
537KB
-
Sample
230403-eyz8tscf83
-
MD5
93444fb9c1a7e87479aa770cb9f6db4e
-
SHA1
45ad44d1b90dd5f0daeb6796ce7ff0174835667a
-
SHA256
653c4cb04042e09d643efaa1bd1d15ea60285cfe57bb1ed1759b3d554d773ea8
-
SHA512
7126d3752ca07958ca3605c0f79b643a37e467e89846559607bec7713ace70af08ac7cdd9928745672ffcc7a0e24583f1ac8a2fe4325ed3a93f88f7a9383eea5
-
SSDEEP
12288:1Mr0y90TOrHxcCwb0GCi6rUsqHHwLdO+xD2hfGTK2:tyIm4yi6rOnwLd6eTb
Static task
static1
Behavioral task
behavioral1
Sample
653c4cb04042e09d643efaa1bd1d15ea60285cfe57bb1ed1759b3d554d773ea8.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
653c4cb04042e09d643efaa1bd1d15ea60285cfe57bb1ed1759b3d554d773ea8
-
Size
537KB
-
MD5
93444fb9c1a7e87479aa770cb9f6db4e
-
SHA1
45ad44d1b90dd5f0daeb6796ce7ff0174835667a
-
SHA256
653c4cb04042e09d643efaa1bd1d15ea60285cfe57bb1ed1759b3d554d773ea8
-
SHA512
7126d3752ca07958ca3605c0f79b643a37e467e89846559607bec7713ace70af08ac7cdd9928745672ffcc7a0e24583f1ac8a2fe4325ed3a93f88f7a9383eea5
-
SSDEEP
12288:1Mr0y90TOrHxcCwb0GCi6rUsqHHwLdO+xD2hfGTK2:tyIm4yi6rOnwLd6eTb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-