General
-
Target
2adb7055e74c4c60d9ff1cecd07071175690226e78b7cf1a74af9606ec7ffdbd
-
Size
354KB
-
Sample
230323-dslb2sdc27
-
MD5
8db1b4596807469f7b864f94d0171b71
-
SHA1
35b1cfdbb9f95525bcd2ffe31faaf878bb813e93
-
SHA256
2adb7055e74c4c60d9ff1cecd07071175690226e78b7cf1a74af9606ec7ffdbd
-
SHA512
8018d14314a9f0aa23e90dceeab0d6906b652105d2579adfb4152815b1c13eeff2a6d4468a6a0117c509b318f364d84a968be7b56ab7d77e454dade5eb4a2181
-
SSDEEP
6144:SXqPfNZ69EkN0UZYlNmVV9f2N9xU/3OoP:UqPfNZYnmYYjmVVh3/3OoP
Static task
static1
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Targets
-
-
Target
2adb7055e74c4c60d9ff1cecd07071175690226e78b7cf1a74af9606ec7ffdbd
-
Size
354KB
-
MD5
8db1b4596807469f7b864f94d0171b71
-
SHA1
35b1cfdbb9f95525bcd2ffe31faaf878bb813e93
-
SHA256
2adb7055e74c4c60d9ff1cecd07071175690226e78b7cf1a74af9606ec7ffdbd
-
SHA512
8018d14314a9f0aa23e90dceeab0d6906b652105d2579adfb4152815b1c13eeff2a6d4468a6a0117c509b318f364d84a968be7b56ab7d77e454dade5eb4a2181
-
SSDEEP
6144:SXqPfNZ69EkN0UZYlNmVV9f2N9xU/3OoP:UqPfNZYnmYYjmVVh3/3OoP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-