General
-
Target
accf37a414e0ea67399c8f87806adf1c67986b01e3c02ac8ce31d38087a768c3
-
Size
521KB
-
Sample
230403-xpmv9agf26
-
MD5
7253957c787a6353c93c293a61e2e2c2
-
SHA1
29d16a2e094c3a5968fe495136043886122a1723
-
SHA256
accf37a414e0ea67399c8f87806adf1c67986b01e3c02ac8ce31d38087a768c3
-
SHA512
93b77d5a15454ad7939dcacb8cf65a147eec9a9b62044819d0e2e501729ac37adf60e8323aa018620b01adeaa72f71f920e8adb447672d1a65a2e33d33e341b8
-
SSDEEP
12288:dMr5y90lhl1BP0YiW/owRkkFm//b5sl6ZlP6OAG/:YyAdQ8q//isZ5Vf
Static task
static1
Behavioral task
behavioral1
Sample
accf37a414e0ea67399c8f87806adf1c67986b01e3c02ac8ce31d38087a768c3.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
accf37a414e0ea67399c8f87806adf1c67986b01e3c02ac8ce31d38087a768c3
-
Size
521KB
-
MD5
7253957c787a6353c93c293a61e2e2c2
-
SHA1
29d16a2e094c3a5968fe495136043886122a1723
-
SHA256
accf37a414e0ea67399c8f87806adf1c67986b01e3c02ac8ce31d38087a768c3
-
SHA512
93b77d5a15454ad7939dcacb8cf65a147eec9a9b62044819d0e2e501729ac37adf60e8323aa018620b01adeaa72f71f920e8adb447672d1a65a2e33d33e341b8
-
SSDEEP
12288:dMr5y90lhl1BP0YiW/owRkkFm//b5sl6ZlP6OAG/:YyAdQ8q//isZ5Vf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-