General
-
Target
9ab60b02c514d652b52fe7de5ce4e8840e9329cbfe7a664925e176281db7fd90
-
Size
522KB
-
Sample
230403-n8n3zsga7x
-
MD5
77248a524cf9dd110b98d67355e31092
-
SHA1
ca334a3fef0e0620bad180f4a867d899fc419708
-
SHA256
9ab60b02c514d652b52fe7de5ce4e8840e9329cbfe7a664925e176281db7fd90
-
SHA512
024c494fb59459fdfc38bef5d50fbc5d42b9ea44579dee908c1441f8c5ce9c8fe706fea1a80c80cd890bbb0c3e83d1b251501d1b7e92b720dd3feb8b40c66ef7
-
SSDEEP
12288:jMr1y90o3/VqRY/bOs4p4Zpv32Nsmu5HZLEnAUCF9I:CyjoaUp4Zpv32Ns7ZLE4rI
Static task
static1
Behavioral task
behavioral1
Sample
9ab60b02c514d652b52fe7de5ce4e8840e9329cbfe7a664925e176281db7fd90.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
9ab60b02c514d652b52fe7de5ce4e8840e9329cbfe7a664925e176281db7fd90
-
Size
522KB
-
MD5
77248a524cf9dd110b98d67355e31092
-
SHA1
ca334a3fef0e0620bad180f4a867d899fc419708
-
SHA256
9ab60b02c514d652b52fe7de5ce4e8840e9329cbfe7a664925e176281db7fd90
-
SHA512
024c494fb59459fdfc38bef5d50fbc5d42b9ea44579dee908c1441f8c5ce9c8fe706fea1a80c80cd890bbb0c3e83d1b251501d1b7e92b720dd3feb8b40c66ef7
-
SSDEEP
12288:jMr1y90o3/VqRY/bOs4p4Zpv32Nsmu5HZLEnAUCF9I:CyjoaUp4Zpv32Ns7ZLE4rI
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-