General
-
Target
c041106df59519774883a678b1d04dbf6e080567a3deae37422782c35d973bcb
-
Size
660KB
-
Sample
230403-xrsjhsad6w
-
MD5
6b9b11b0c419d24617068bfb8483dbda
-
SHA1
d9f2d4d9da7a845aeb728558fd04540c5dd5f4cc
-
SHA256
c041106df59519774883a678b1d04dbf6e080567a3deae37422782c35d973bcb
-
SHA512
ff29173a8084f20e327f563a2c682e2e58ef435add5023006b2b85176ea45d04bae462c3757e70069ee5e3b3423a1a1fb9cb9ca368449eb080a7c6ae9dd45775
-
SSDEEP
12288:TMrwy90IKwv9T75oneDl1nSo2Hbx/HiZd9VZShuJjfl6eXgl9ZoYR+:7yp9CneDG/HiihuJs39CYR+
Static task
static1
Behavioral task
behavioral1
Sample
c041106df59519774883a678b1d04dbf6e080567a3deae37422782c35d973bcb.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
c041106df59519774883a678b1d04dbf6e080567a3deae37422782c35d973bcb
-
Size
660KB
-
MD5
6b9b11b0c419d24617068bfb8483dbda
-
SHA1
d9f2d4d9da7a845aeb728558fd04540c5dd5f4cc
-
SHA256
c041106df59519774883a678b1d04dbf6e080567a3deae37422782c35d973bcb
-
SHA512
ff29173a8084f20e327f563a2c682e2e58ef435add5023006b2b85176ea45d04bae462c3757e70069ee5e3b3423a1a1fb9cb9ca368449eb080a7c6ae9dd45775
-
SSDEEP
12288:TMrwy90IKwv9T75oneDl1nSo2Hbx/HiZd9VZShuJjfl6eXgl9ZoYR+:7yp9CneDG/HiihuJs39CYR+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-