General
-
Target
b3b3828acc8dacd6f66f115329bb8c7d55a1a03e71d2c01a27713d2b39918ae1
-
Size
265KB
-
Sample
220609-lmzlgsefap
-
MD5
ea51e8dea56b76b896057a3a0e7ca495
-
SHA1
9ec1fe80f580aa68438e61b3cbb283b44b040818
-
SHA256
b3b3828acc8dacd6f66f115329bb8c7d55a1a03e71d2c01a27713d2b39918ae1
-
SHA512
c12fee9a4659ae4256f5c24ed52fb1facc77be5e17fa31556b1dabcc093bf3792955a1fd092e7491258ec149c9cfe76dfd7e54bfa198a505b7a53bfe92c8360e
Static task
static1
Malware Config
Extracted
redline
PRIVATOS
185.215.113.75:81
-
auth_value
5ea9b11f430f74fc81d40ef634ac1813
Extracted
redline
Lyla2
185.215.113.201:21921
-
auth_value
f3b96059847b054b3939cadefd4424ee
Targets
-
-
Target
b3b3828acc8dacd6f66f115329bb8c7d55a1a03e71d2c01a27713d2b39918ae1
-
Size
265KB
-
MD5
ea51e8dea56b76b896057a3a0e7ca495
-
SHA1
9ec1fe80f580aa68438e61b3cbb283b44b040818
-
SHA256
b3b3828acc8dacd6f66f115329bb8c7d55a1a03e71d2c01a27713d2b39918ae1
-
SHA512
c12fee9a4659ae4256f5c24ed52fb1facc77be5e17fa31556b1dabcc093bf3792955a1fd092e7491258ec149c9cfe76dfd7e54bfa198a505b7a53bfe92c8360e
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-