General
-
Target
f8473b859306626052f09f803805c0f97b2f6ae42cface1c5ffd9b989dea2566
-
Size
522KB
-
Sample
230403-s7xqysff86
-
MD5
e8b3316a4306a07f0277935d8e7e270e
-
SHA1
7beb3d2fd3541f2c53429b5c107982d5e450023c
-
SHA256
f8473b859306626052f09f803805c0f97b2f6ae42cface1c5ffd9b989dea2566
-
SHA512
7cf7e561ddae383166a0ab904c3a990b8929a81ebca2ffe9af9d94f0d8af6279b8d34a50d8e98cb1a6550f369b0be1ba363e610089bf628e053980b0aefe97ae
-
SSDEEP
12288:YMrvy90H3qjJFmPsqsqRwUYskhvKs6rLiSQdHT8IX+:HydFmPU9phCs66RHT8Z
Static task
static1
Behavioral task
behavioral1
Sample
f8473b859306626052f09f803805c0f97b2f6ae42cface1c5ffd9b989dea2566.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
f8473b859306626052f09f803805c0f97b2f6ae42cface1c5ffd9b989dea2566
-
Size
522KB
-
MD5
e8b3316a4306a07f0277935d8e7e270e
-
SHA1
7beb3d2fd3541f2c53429b5c107982d5e450023c
-
SHA256
f8473b859306626052f09f803805c0f97b2f6ae42cface1c5ffd9b989dea2566
-
SHA512
7cf7e561ddae383166a0ab904c3a990b8929a81ebca2ffe9af9d94f0d8af6279b8d34a50d8e98cb1a6550f369b0be1ba363e610089bf628e053980b0aefe97ae
-
SSDEEP
12288:YMrvy90H3qjJFmPsqsqRwUYskhvKs6rLiSQdHT8IX+:HydFmPU9phCs66RHT8Z
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-