General
-
Target
8cb116c304dfe02504066069a91cc3f188437876eccee86c6e80d3c3ca954675
-
Size
522KB
-
Sample
230403-rtpyhsgh8w
-
MD5
9ebf1136777b6492d6d98a3b19479c6c
-
SHA1
6b70ff217c64a42394b1f0b2785528b4a962bba0
-
SHA256
8cb116c304dfe02504066069a91cc3f188437876eccee86c6e80d3c3ca954675
-
SHA512
a04b149a7678a09ec3322c3ac2f8368f737ec2e16f83f5cc46a7eb134be83966bf41107281f706d3a3e83e2db905be8d8d7e25ee578a7c5ecf5508b30658786c
-
SSDEEP
12288:kMrHy90EDeq5+gHIlxXWPgkrgpNInElC6:7yHCGAlxqTrWNI8r
Static task
static1
Behavioral task
behavioral1
Sample
8cb116c304dfe02504066069a91cc3f188437876eccee86c6e80d3c3ca954675.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
8cb116c304dfe02504066069a91cc3f188437876eccee86c6e80d3c3ca954675
-
Size
522KB
-
MD5
9ebf1136777b6492d6d98a3b19479c6c
-
SHA1
6b70ff217c64a42394b1f0b2785528b4a962bba0
-
SHA256
8cb116c304dfe02504066069a91cc3f188437876eccee86c6e80d3c3ca954675
-
SHA512
a04b149a7678a09ec3322c3ac2f8368f737ec2e16f83f5cc46a7eb134be83966bf41107281f706d3a3e83e2db905be8d8d7e25ee578a7c5ecf5508b30658786c
-
SSDEEP
12288:kMrHy90EDeq5+gHIlxXWPgkrgpNInElC6:7yHCGAlxqTrWNI8r
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-