General
-
Target
e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901
-
Size
522KB
-
Sample
230403-x8ad9sgg44
-
MD5
01dc49dd13f3d6f575794972d0a03f65
-
SHA1
cba7c2b575766c5320a1c2bbf155c4dbc0ea3384
-
SHA256
e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901
-
SHA512
d97b8b0ae3f2b086ea5bb6b8411e417964c7b84ea987213ffea229505641cf892b5de281f2475c9ac99765cb9d3e65f61581f1c38aea6e1cd15881bd92f85cde
-
SSDEEP
12288:PMrZy903EO/AGuxUHYoksH8av42XzWKH2uv+TH9:SyKEOvaaw2SKG79
Static task
static1
Behavioral task
behavioral1
Sample
e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901
-
Size
522KB
-
MD5
01dc49dd13f3d6f575794972d0a03f65
-
SHA1
cba7c2b575766c5320a1c2bbf155c4dbc0ea3384
-
SHA256
e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901
-
SHA512
d97b8b0ae3f2b086ea5bb6b8411e417964c7b84ea987213ffea229505641cf892b5de281f2475c9ac99765cb9d3e65f61581f1c38aea6e1cd15881bd92f85cde
-
SSDEEP
12288:PMrZy903EO/AGuxUHYoksH8av42XzWKH2uv+TH9:SyKEOvaaw2SKG79
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-