General
-
Target
f828e75c4d04ffd742565983937ffa0917a29b7e0d09bbd83fa116680325eb51
-
Size
657KB
-
Sample
230403-y8awgaag5y
-
MD5
0c67a547e642d9553484044d9923d5f1
-
SHA1
6538c35e3afec0a5cfddc8e2c216c69cbd2c8583
-
SHA256
f828e75c4d04ffd742565983937ffa0917a29b7e0d09bbd83fa116680325eb51
-
SHA512
9d6d13f6e4403648bf70733b13e3b128f4d8f69e6320df1057fe41de143792d1e49ed6f2c7bc731d40756f90d16ed420d1c64a8a029dd4472fdbf45515192ef1
-
SSDEEP
12288:xMrOy90ZwZFrqvenh4n72VRft4qWHfi063FBLt8LO3Wno44OzWKpP8vjrN:XyiwZIenooftNgf963FBhVmnh4XKorN
Static task
static1
Behavioral task
behavioral1
Sample
f828e75c4d04ffd742565983937ffa0917a29b7e0d09bbd83fa116680325eb51.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
f828e75c4d04ffd742565983937ffa0917a29b7e0d09bbd83fa116680325eb51
-
Size
657KB
-
MD5
0c67a547e642d9553484044d9923d5f1
-
SHA1
6538c35e3afec0a5cfddc8e2c216c69cbd2c8583
-
SHA256
f828e75c4d04ffd742565983937ffa0917a29b7e0d09bbd83fa116680325eb51
-
SHA512
9d6d13f6e4403648bf70733b13e3b128f4d8f69e6320df1057fe41de143792d1e49ed6f2c7bc731d40756f90d16ed420d1c64a8a029dd4472fdbf45515192ef1
-
SSDEEP
12288:xMrOy90ZwZFrqvenh4n72VRft4qWHfi063FBLt8LO3Wno44OzWKpP8vjrN:XyiwZIenooftNgf963FBhVmnh4XKorN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-