General
-
Target
fab55e61eff116d7e11d6a4b15199af0d7bead3bc3c8d20651d46220bf3c0090
-
Size
658KB
-
Sample
230403-yy738aaf9y
-
MD5
bc8e2db8eed3705d26acdf89df13c40a
-
SHA1
4e4c1a9728625d5ca1130d436781ea202ca4875b
-
SHA256
fab55e61eff116d7e11d6a4b15199af0d7bead3bc3c8d20651d46220bf3c0090
-
SHA512
136b89beaa912e41882ecb8e38be6e00316841417bf31d05256cd89c25b3b9c37378c6c1ca8feb1eec51f6b1e6839c01506a73dab14206d8e5eec6f93c09c4d7
-
SSDEEP
12288:XMrQy90ZPka9q5TfLD8WkF/nqUA4skTeO72Lt8OxxGH144fzWKb88vAF9/SN:vyZ5TfQFSUonh7IHm4qK4Fe
Static task
static1
Behavioral task
behavioral1
Sample
fab55e61eff116d7e11d6a4b15199af0d7bead3bc3c8d20651d46220bf3c0090.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
fab55e61eff116d7e11d6a4b15199af0d7bead3bc3c8d20651d46220bf3c0090
-
Size
658KB
-
MD5
bc8e2db8eed3705d26acdf89df13c40a
-
SHA1
4e4c1a9728625d5ca1130d436781ea202ca4875b
-
SHA256
fab55e61eff116d7e11d6a4b15199af0d7bead3bc3c8d20651d46220bf3c0090
-
SHA512
136b89beaa912e41882ecb8e38be6e00316841417bf31d05256cd89c25b3b9c37378c6c1ca8feb1eec51f6b1e6839c01506a73dab14206d8e5eec6f93c09c4d7
-
SSDEEP
12288:XMrQy90ZPka9q5TfLD8WkF/nqUA4skTeO72Lt8OxxGH144fzWKb88vAF9/SN:vyZ5TfQFSUonh7IHm4qK4Fe
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-