General
-
Target
7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416
-
Size
658KB
-
Sample
230403-zd9a8aag81
-
MD5
43e4f58323683d6cf34c890aac6bfc98
-
SHA1
9016fa07be5b549da3bfa08e7da38bccc4c87cba
-
SHA256
7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416
-
SHA512
0bbaf57622eaa0d11979f93d6d053dbffb512b13e757c643b221ec439321dcd6d6643eadf8bbddf092450a4d97760cfe9e6ab80a6b0696f7eb794382bb449211
-
SSDEEP
12288:8Mroy90KtmUAd3m1mAE1DWwp8TyYkfAPWiLt800JrM3440zWKCT8vrd+x:kyJtevB1D3pu+ihcFMo4dKUx
Static task
static1
Behavioral task
behavioral1
Sample
7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416
-
Size
658KB
-
MD5
43e4f58323683d6cf34c890aac6bfc98
-
SHA1
9016fa07be5b549da3bfa08e7da38bccc4c87cba
-
SHA256
7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416
-
SHA512
0bbaf57622eaa0d11979f93d6d053dbffb512b13e757c643b221ec439321dcd6d6643eadf8bbddf092450a4d97760cfe9e6ab80a6b0696f7eb794382bb449211
-
SSDEEP
12288:8Mroy90KtmUAd3m1mAE1DWwp8TyYkfAPWiLt800JrM3440zWKCT8vrd+x:kyJtevB1D3pu+ihcFMo4dKUx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-