General
-
Target
aebab14385825074e263435b09e35030bf6d7d50e6cd465ea5be206abcc60531
-
Size
658KB
-
Sample
230403-yr4gfsgh57
-
MD5
d2476de9abcdba3f76e85e3d164a2100
-
SHA1
e2eb08cc8afa2024c810753d4460c841b849e6ed
-
SHA256
aebab14385825074e263435b09e35030bf6d7d50e6cd465ea5be206abcc60531
-
SHA512
1e08e87a315ac7826f11be6d4b87224a964b9e5176fcae71d6668df29488a1b80e3a174355bf0194236ccc0156802250841ca2fafd11710fa5aec1cd5660d0c7
-
SSDEEP
12288:3Mr0y90kn8Gr7VmrmtfdaQdif0URjynm447zWKde8vrLA:3yNNromtFHrURenP4mK/A
Static task
static1
Behavioral task
behavioral1
Sample
aebab14385825074e263435b09e35030bf6d7d50e6cd465ea5be206abcc60531.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
aebab14385825074e263435b09e35030bf6d7d50e6cd465ea5be206abcc60531
-
Size
658KB
-
MD5
d2476de9abcdba3f76e85e3d164a2100
-
SHA1
e2eb08cc8afa2024c810753d4460c841b849e6ed
-
SHA256
aebab14385825074e263435b09e35030bf6d7d50e6cd465ea5be206abcc60531
-
SHA512
1e08e87a315ac7826f11be6d4b87224a964b9e5176fcae71d6668df29488a1b80e3a174355bf0194236ccc0156802250841ca2fafd11710fa5aec1cd5660d0c7
-
SSDEEP
12288:3Mr0y90kn8Gr7VmrmtfdaQdif0URjynm447zWKde8vrLA:3yNNromtFHrURenP4mK/A
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-