General
-
Target
ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86
-
Size
659KB
-
Sample
230403-q4c62agg3x
-
MD5
ebf78f10f286c370b5af52326c8fea53
-
SHA1
fb1d5b688d0feb8e5b21e343cc4a50c813c2980e
-
SHA256
ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86
-
SHA512
89d13cad7d35b839c76ae154db7d2317404a6b4e2c05bb0fa0d0d279b60da0d85ba183113b368f1e84f10da7139f130da0767febc30de3e7909a519487f568a8
-
SSDEEP
12288:dMrsy90Sd/VXewgvmJU7cB2IVN88Zebhh9ohUKhGc10wZXTUB/RqgbiFJvxThS:1yF/FevvMUZITDebhKPf10iYBJqAiFJq
Static task
static1
Behavioral task
behavioral1
Sample
ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86
-
Size
659KB
-
MD5
ebf78f10f286c370b5af52326c8fea53
-
SHA1
fb1d5b688d0feb8e5b21e343cc4a50c813c2980e
-
SHA256
ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86
-
SHA512
89d13cad7d35b839c76ae154db7d2317404a6b4e2c05bb0fa0d0d279b60da0d85ba183113b368f1e84f10da7139f130da0767febc30de3e7909a519487f568a8
-
SSDEEP
12288:dMrsy90Sd/VXewgvmJU7cB2IVN88Zebhh9ohUKhGc10wZXTUB/RqgbiFJvxThS:1yF/FevvMUZITDebhKPf10iYBJqAiFJq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-