General
-
Target
e2437679ed91b9d1479b0044862ce20ba69124c2bb6149f00ae56c000f3f4f9f
-
Size
658KB
-
Sample
230403-qndsmagf4x
-
MD5
769c6f9819f7e0398586195acc653418
-
SHA1
d38164345668e010546c7a895b68b5ada10cfc76
-
SHA256
e2437679ed91b9d1479b0044862ce20ba69124c2bb6149f00ae56c000f3f4f9f
-
SHA512
652adcd0756ac70b9ab48ab5b83630bb1344d984f8fe80b36667d5541fcb6f88d26819439bf5635d401dad0927b35b4bf71de86a8407c16d0a91af590ae7a8cb
-
SSDEEP
12288:JMrry90WmSq5Jy21nTWwCWPBRa29ohU25H27s9dh5ijp/0oKIRigXTI89g+z:Wy98nTWr8BGfA7AhgrKGiETI89Xz
Static task
static1
Behavioral task
behavioral1
Sample
e2437679ed91b9d1479b0044862ce20ba69124c2bb6149f00ae56c000f3f4f9f.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
e2437679ed91b9d1479b0044862ce20ba69124c2bb6149f00ae56c000f3f4f9f
-
Size
658KB
-
MD5
769c6f9819f7e0398586195acc653418
-
SHA1
d38164345668e010546c7a895b68b5ada10cfc76
-
SHA256
e2437679ed91b9d1479b0044862ce20ba69124c2bb6149f00ae56c000f3f4f9f
-
SHA512
652adcd0756ac70b9ab48ab5b83630bb1344d984f8fe80b36667d5541fcb6f88d26819439bf5635d401dad0927b35b4bf71de86a8407c16d0a91af590ae7a8cb
-
SSDEEP
12288:JMrry90WmSq5Jy21nTWwCWPBRa29ohU25H27s9dh5ijp/0oKIRigXTI89g+z:Wy98nTWr8BGfA7AhgrKGiETI89Xz
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-