General
-
Target
fc8f55d2015a3e0a80327f953b2188f05cbc1238756212230d970644f2df235e
-
Size
522KB
-
Sample
230403-zej3qaag9s
-
MD5
76be5d2e2c863d49e7be87f5d233066e
-
SHA1
fe8b7546ce30e602d6d23e480b7965d2b7e8b45c
-
SHA256
fc8f55d2015a3e0a80327f953b2188f05cbc1238756212230d970644f2df235e
-
SHA512
95e8c3df38e8f4b922b697ee7d84346b21ba72473cb860779f2cd2a156291682f7afe581a028809e18f6ecf58fd4eccdf27d60a1c357928a9d0d96595eea66b4
-
SSDEEP
12288:NMrHy90NNSLK/aGBocQ8Dc4M2zWKUEEqiuMP+n7r:iyGgKyqoaD9MvKUEnz3r
Static task
static1
Behavioral task
behavioral1
Sample
fc8f55d2015a3e0a80327f953b2188f05cbc1238756212230d970644f2df235e.exe
Resource
win10-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
fc8f55d2015a3e0a80327f953b2188f05cbc1238756212230d970644f2df235e
-
Size
522KB
-
MD5
76be5d2e2c863d49e7be87f5d233066e
-
SHA1
fe8b7546ce30e602d6d23e480b7965d2b7e8b45c
-
SHA256
fc8f55d2015a3e0a80327f953b2188f05cbc1238756212230d970644f2df235e
-
SHA512
95e8c3df38e8f4b922b697ee7d84346b21ba72473cb860779f2cd2a156291682f7afe581a028809e18f6ecf58fd4eccdf27d60a1c357928a9d0d96595eea66b4
-
SSDEEP
12288:NMrHy90NNSLK/aGBocQ8Dc4M2zWKUEEqiuMP+n7r:iyGgKyqoaD9MvKUEnz3r
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-