General
-
Target
3c8557f21a54f571d9f39be6f9bc2c79c67ef85a8175f7937adf0d8ae8cd1dcf
-
Size
658KB
-
Sample
230403-y2zagsha25
-
MD5
f0c9fab00b2273d8e92a7ad68517bde5
-
SHA1
dcf24c80fe6276bd0e5ed8590089ed0fc807d7b7
-
SHA256
3c8557f21a54f571d9f39be6f9bc2c79c67ef85a8175f7937adf0d8ae8cd1dcf
-
SHA512
afc9500d2d077040637845bb68ad652bef6c9faced472ddc90831d2e143ea59dc6beadee0a3aa6c7deb0971798e3da0b7bf7178ddf663a30022a75dbf4794f88
-
SSDEEP
12288:8Mryy90SYziktCuFRcjtka3MtD4c6WLt8sWij4q44OzWK2o8vOu6446:Gyyzm0RcxtMtMc6WhOm4L4XKnud
Static task
static1
Behavioral task
behavioral1
Sample
3c8557f21a54f571d9f39be6f9bc2c79c67ef85a8175f7937adf0d8ae8cd1dcf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
3c8557f21a54f571d9f39be6f9bc2c79c67ef85a8175f7937adf0d8ae8cd1dcf
-
Size
658KB
-
MD5
f0c9fab00b2273d8e92a7ad68517bde5
-
SHA1
dcf24c80fe6276bd0e5ed8590089ed0fc807d7b7
-
SHA256
3c8557f21a54f571d9f39be6f9bc2c79c67ef85a8175f7937adf0d8ae8cd1dcf
-
SHA512
afc9500d2d077040637845bb68ad652bef6c9faced472ddc90831d2e143ea59dc6beadee0a3aa6c7deb0971798e3da0b7bf7178ddf663a30022a75dbf4794f88
-
SSDEEP
12288:8Mryy90SYziktCuFRcjtka3MtD4c6WLt8sWij4q44OzWK2o8vOu6446:Gyyzm0RcxtMtMc6WhOm4L4XKnud
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-