General
-
Target
c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0
-
Size
658KB
-
Sample
230403-z6tfgaba5w
-
MD5
ff3941ae83a22d66cde4f05c3205f15b
-
SHA1
ad9fb7547f358075477ecf4fe10b36ca61d252ac
-
SHA256
c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0
-
SHA512
7ff01f13f3ba0993251bd4d7ed2bc10d8e10191b6f1113fcd306e76ca60ca436be6ddbe3fc8282ebd12a09978d08ea802587a73a5fb3d3d5237c01d0f887c988
-
SSDEEP
12288:tMrgy902AHCfUa/E141udt+3DQ8jwRrMAdWS44fzWKlV8vrlMLY6:1yMO/mdtoMmC5WD4qKilMLv
Static task
static1
Behavioral task
behavioral1
Sample
c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0
-
Size
658KB
-
MD5
ff3941ae83a22d66cde4f05c3205f15b
-
SHA1
ad9fb7547f358075477ecf4fe10b36ca61d252ac
-
SHA256
c1cf92434f139cce3edacb7d3e53ee010a617132698089d376c45e6b40d482a0
-
SHA512
7ff01f13f3ba0993251bd4d7ed2bc10d8e10191b6f1113fcd306e76ca60ca436be6ddbe3fc8282ebd12a09978d08ea802587a73a5fb3d3d5237c01d0f887c988
-
SSDEEP
12288:tMrgy902AHCfUa/E141udt+3DQ8jwRrMAdWS44fzWKlV8vrlMLY6:1yMO/mdtoMmC5WD4qKilMLv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-