General
-
Target
7fdbb82dd086bfa12770757eceafd8dd42f3cff46fb2772ffe9a3b1de04385a3
-
Size
522KB
-
Sample
230403-x6hmvsae41
-
MD5
c94919e707efdc5122022e2effe0ac19
-
SHA1
157109d986956264c79229122828e54dcaf4fe4c
-
SHA256
7fdbb82dd086bfa12770757eceafd8dd42f3cff46fb2772ffe9a3b1de04385a3
-
SHA512
d9fcc8a827532ddb8d8b6ffe2128a4e86663d308b46c761135c5150c03caea3f36a1519cc47d4dc6f830ffd656fd5083b624da8b35a2a6e93c6c16f8bb96920e
-
SSDEEP
12288:eMrHy90x13BGAsqt6C+dEKw1LHv8uv4uvzWK3eIvZmRLevfm:5ya+5CCeR0uwu6KQheW
Static task
static1
Behavioral task
behavioral1
Sample
7fdbb82dd086bfa12770757eceafd8dd42f3cff46fb2772ffe9a3b1de04385a3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
7fdbb82dd086bfa12770757eceafd8dd42f3cff46fb2772ffe9a3b1de04385a3
-
Size
522KB
-
MD5
c94919e707efdc5122022e2effe0ac19
-
SHA1
157109d986956264c79229122828e54dcaf4fe4c
-
SHA256
7fdbb82dd086bfa12770757eceafd8dd42f3cff46fb2772ffe9a3b1de04385a3
-
SHA512
d9fcc8a827532ddb8d8b6ffe2128a4e86663d308b46c761135c5150c03caea3f36a1519cc47d4dc6f830ffd656fd5083b624da8b35a2a6e93c6c16f8bb96920e
-
SSDEEP
12288:eMrHy90x13BGAsqt6C+dEKw1LHv8uv4uvzWK3eIvZmRLevfm:5ya+5CCeR0uwu6KQheW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-