General
-
Target
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698
-
Size
689KB
-
Sample
230404-tcbexagd56
-
MD5
419f78993f29965cd3c3fcfc459937b1
-
SHA1
aa1244f33844b769ff336810ce57e7c322aa07ff
-
SHA256
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698
-
SHA512
34468c8953b1a0c07b9c8b01ccee8705328ff16a666c62dd01cce0f31e96e93cb0659e21761c4066613d194484a587574265c5ff8ba916ea706c6be9b0901175
-
SSDEEP
12288:TMrvy90nY6MGhbe/HHXA2HWDZa7cMF5sptCC/a1na23EEEFxJajsno4UdeMJDCON:MyAY6MQbATHWaF5sGC/a1nmEEFujs4ei
Static task
static1
Behavioral task
behavioral1
Sample
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698
-
Size
689KB
-
MD5
419f78993f29965cd3c3fcfc459937b1
-
SHA1
aa1244f33844b769ff336810ce57e7c322aa07ff
-
SHA256
e74e1d1c204938e2f721f21dc77df63915be0069627d0b75aceb2d36ab3f0698
-
SHA512
34468c8953b1a0c07b9c8b01ccee8705328ff16a666c62dd01cce0f31e96e93cb0659e21761c4066613d194484a587574265c5ff8ba916ea706c6be9b0901175
-
SSDEEP
12288:TMrvy90nY6MGhbe/HHXA2HWDZa7cMF5sptCC/a1na23EEEFxJajsno4UdeMJDCON:MyAY6MQbATHWaF5sGC/a1nmEEFujs4ei
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-