General
-
Target
67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2
-
Size
664KB
-
Sample
230403-x8v1zaae6v
-
MD5
91bea32ffcc395a83ccd89604f4a1a28
-
SHA1
4020865b3f373d300346b2448a4d4400060364b0
-
SHA256
67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2
-
SHA512
32003e168c9e2a2a80366f8b60730113d710e64c61472ee17e5ee1b98f92741e30f34fd6a7d68d365a3e041b90b2885debb5033a8af837e1bc3773cf3cf912c9
-
SSDEEP
12288:xMrUy90y5Zz4mtJUgqn7XPQLui1mFJ64RdR0hwujdR+44tzWKPs8vGidxiP:dy/kCqnrcIr6W5SR34wKqSiP
Static task
static1
Behavioral task
behavioral1
Sample
67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2
-
Size
664KB
-
MD5
91bea32ffcc395a83ccd89604f4a1a28
-
SHA1
4020865b3f373d300346b2448a4d4400060364b0
-
SHA256
67970f5af720119c63c471072eb17395ff953df6183f67d9664ffffd0e8bcce2
-
SHA512
32003e168c9e2a2a80366f8b60730113d710e64c61472ee17e5ee1b98f92741e30f34fd6a7d68d365a3e041b90b2885debb5033a8af837e1bc3773cf3cf912c9
-
SSDEEP
12288:xMrUy90y5Zz4mtJUgqn7XPQLui1mFJ64RdR0hwujdR+44tzWKPs8vGidxiP:dy/kCqnrcIr6W5SR34wKqSiP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-