General
-
Target
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555
-
Size
522KB
-
Sample
230403-ybl78sae7x
-
MD5
d48698d44239f63c8cb139db6051cb8d
-
SHA1
9e9e24ca9fca36f16d075f390020730a392055cd
-
SHA256
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555
-
SHA512
69fe4d28d0202253c04e383ba0f88134d6ec5e7d8decc68fffa4917b6695fef371ed6bc5768d14ced367f328d916a96cb922d0fd451f27bdda2bf9e4e4a3fd99
-
SSDEEP
12288:LMrny90+w/2HnZ4VBUBgz+Cpmy87c4UlzWK/bU28XlgL:8yA2HOVIn79UYKoDeL
Static task
static1
Behavioral task
behavioral1
Sample
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555
-
Size
522KB
-
MD5
d48698d44239f63c8cb139db6051cb8d
-
SHA1
9e9e24ca9fca36f16d075f390020730a392055cd
-
SHA256
5ab9c43f2a2a9655bedbaca46a79c21ff392a22c7d9fbd8dcf416aca390ad555
-
SHA512
69fe4d28d0202253c04e383ba0f88134d6ec5e7d8decc68fffa4917b6695fef371ed6bc5768d14ced367f328d916a96cb922d0fd451f27bdda2bf9e4e4a3fd99
-
SSDEEP
12288:LMrny90+w/2HnZ4VBUBgz+Cpmy87c4UlzWK/bU28XlgL:8yA2HOVIn79UYKoDeL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-