General
-
Target
ddb12a61b51f142b3d4e60c8e933ab36c6ad957def7877263130f44ebae42f68
-
Size
417KB
-
Sample
230321-sfsmxsbf49
-
MD5
c7ec31fb426385cd543fc51e47852c66
-
SHA1
2153b6a5b77d8bbc2fe741f3d5ee6329aa5c6105
-
SHA256
ddb12a61b51f142b3d4e60c8e933ab36c6ad957def7877263130f44ebae42f68
-
SHA512
80ea5dd7e94d49c1a1806d4ffad3ebe60fab47c40922baa00824363e8486a51e709e2af29db635989967062c40ec9566efdfe10fe56584708c54c03159e95b3d
-
SSDEEP
6144:e8cALHdICVDrsImdDT5HAVo+KIysK5eIDBJWO7E:e8cADuCeImJHAVo+ZQjWOQ
Static task
static1
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Targets
-
-
Target
ddb12a61b51f142b3d4e60c8e933ab36c6ad957def7877263130f44ebae42f68
-
Size
417KB
-
MD5
c7ec31fb426385cd543fc51e47852c66
-
SHA1
2153b6a5b77d8bbc2fe741f3d5ee6329aa5c6105
-
SHA256
ddb12a61b51f142b3d4e60c8e933ab36c6ad957def7877263130f44ebae42f68
-
SHA512
80ea5dd7e94d49c1a1806d4ffad3ebe60fab47c40922baa00824363e8486a51e709e2af29db635989967062c40ec9566efdfe10fe56584708c54c03159e95b3d
-
SSDEEP
6144:e8cALHdICVDrsImdDT5HAVo+KIysK5eIDBJWO7E:e8cADuCeImJHAVo+ZQjWOQ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-