General
-
Target
549974d83f63c37df35d8f3854dd163d40190d45900e231d525d6f9096af58f7
-
Size
660KB
-
Sample
230403-xmervsad3w
-
MD5
b6ffe1e95f7e0999ca30a1bc5b6cab3e
-
SHA1
53df1d739e63697cb5a9ed9a71e5e4a1fad03fc8
-
SHA256
549974d83f63c37df35d8f3854dd163d40190d45900e231d525d6f9096af58f7
-
SHA512
296b16c3527ecf4d7cb8a32b0f0c37ed5217594510306443e3a6c0d3ef73ed68ad51542fab8fc637a21114815a45b5d5b6eea6e0fdbc36a0fa8d85404ce0a6c6
-
SSDEEP
12288:kMruy90wTtdvfi7Isq3Y7+sHZsUQCWZS9wbiTl67d2YuCBl:ay5T3f4Isq3qn5me9w6s52+Bl
Static task
static1
Behavioral task
behavioral1
Sample
549974d83f63c37df35d8f3854dd163d40190d45900e231d525d6f9096af58f7.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
549974d83f63c37df35d8f3854dd163d40190d45900e231d525d6f9096af58f7
-
Size
660KB
-
MD5
b6ffe1e95f7e0999ca30a1bc5b6cab3e
-
SHA1
53df1d739e63697cb5a9ed9a71e5e4a1fad03fc8
-
SHA256
549974d83f63c37df35d8f3854dd163d40190d45900e231d525d6f9096af58f7
-
SHA512
296b16c3527ecf4d7cb8a32b0f0c37ed5217594510306443e3a6c0d3ef73ed68ad51542fab8fc637a21114815a45b5d5b6eea6e0fdbc36a0fa8d85404ce0a6c6
-
SSDEEP
12288:kMruy90wTtdvfi7Isq3Y7+sHZsUQCWZS9wbiTl67d2YuCBl:ay5T3f4Isq3qn5me9w6s52+Bl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-