General
-
Target
4583fdcecc4cdf70c098ba4c9c546a0195f7f0fc535ee266b0772a01e6c2636d
-
Size
657KB
-
Sample
230403-ze5z7aag9v
-
MD5
f7a2d11053dd9a05cf58d2248fb8614e
-
SHA1
677d24f1782eecd47ad5ab6ce5a6402b41f50a14
-
SHA256
4583fdcecc4cdf70c098ba4c9c546a0195f7f0fc535ee266b0772a01e6c2636d
-
SHA512
947bffa090f8e3b4126b9dc488059d5785087e6b851599413a4f47e431050ec874493ae847447f2a4fc8010e952a39e1d07afd5e3ca6359b2bfb3c1505808c94
-
SSDEEP
12288:IMrOy90KoBwLA7TyVRXt4cRK4xH/PupLt8UWOHFO44OzWKs98vtHKgk:GyDlLAv8XtjRxuphiqFn4XKdqP
Static task
static1
Behavioral task
behavioral1
Sample
4583fdcecc4cdf70c098ba4c9c546a0195f7f0fc535ee266b0772a01e6c2636d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
4583fdcecc4cdf70c098ba4c9c546a0195f7f0fc535ee266b0772a01e6c2636d
-
Size
657KB
-
MD5
f7a2d11053dd9a05cf58d2248fb8614e
-
SHA1
677d24f1782eecd47ad5ab6ce5a6402b41f50a14
-
SHA256
4583fdcecc4cdf70c098ba4c9c546a0195f7f0fc535ee266b0772a01e6c2636d
-
SHA512
947bffa090f8e3b4126b9dc488059d5785087e6b851599413a4f47e431050ec874493ae847447f2a4fc8010e952a39e1d07afd5e3ca6359b2bfb3c1505808c94
-
SSDEEP
12288:IMrOy90KoBwLA7TyVRXt4cRK4xH/PupLt8UWOHFO44OzWKs98vtHKgk:GyDlLAv8XtjRxuphiqFn4XKdqP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-