General
-
Target
c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7
-
Size
522KB
-
Sample
230403-zdpltaha73
-
MD5
a6c188daa512b45730f2cbeef28d2a08
-
SHA1
126d87ba73aadbcbc7da36235db62efa94ca8c58
-
SHA256
c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7
-
SHA512
da15d19bc6caf71f9709ff2a01538d7ddf6c430a0cad0315545dad5a060b1f2d428761e37c3e2200ffd534210e3fac6d673d291e0eccb9fd145e24383966fcfc
-
SSDEEP
12288:aMrwy90ojbqWmsVy77wJ3R8m3446zWKKiLaIalW9jBpBX:Sy/ObeuGumo4DKBLaDlW9NX
Static task
static1
Behavioral task
behavioral1
Sample
c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7
-
Size
522KB
-
MD5
a6c188daa512b45730f2cbeef28d2a08
-
SHA1
126d87ba73aadbcbc7da36235db62efa94ca8c58
-
SHA256
c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7
-
SHA512
da15d19bc6caf71f9709ff2a01538d7ddf6c430a0cad0315545dad5a060b1f2d428761e37c3e2200ffd534210e3fac6d673d291e0eccb9fd145e24383966fcfc
-
SSDEEP
12288:aMrwy90ojbqWmsVy77wJ3R8m3446zWKKiLaIalW9jBpBX:Sy/ObeuGumo4DKBLaDlW9NX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-