General
-
Target
779c955965a45ec9c9cbb13942071718e144a878bc3bc5687a76509bedfef2fe
-
Size
348KB
-
Sample
230323-mr6e9sha51
-
MD5
a09acd6077fdbf61a923164fc53177dc
-
SHA1
4e1b866d6d141973279133afaf955c814a3a2954
-
SHA256
779c955965a45ec9c9cbb13942071718e144a878bc3bc5687a76509bedfef2fe
-
SHA512
299d9c610e20e8a27e1aacb9c1319985dd89ec2cc21a6329da27e378c1c6998ee19f5a5acbc623ad8ae5b1ea236287c3ccb11bff4da7466e579be5345c95e0f4
-
SSDEEP
6144:2ztLLGL0k61GTfTzu8YYWXbVYyvLj5BcGJpR4J7r4rvv7gSZ1Ks:SLLGQk61aTaFfpYOLNBNLR49r47v8SZM
Static task
static1
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Targets
-
-
Target
779c955965a45ec9c9cbb13942071718e144a878bc3bc5687a76509bedfef2fe
-
Size
348KB
-
MD5
a09acd6077fdbf61a923164fc53177dc
-
SHA1
4e1b866d6d141973279133afaf955c814a3a2954
-
SHA256
779c955965a45ec9c9cbb13942071718e144a878bc3bc5687a76509bedfef2fe
-
SHA512
299d9c610e20e8a27e1aacb9c1319985dd89ec2cc21a6329da27e378c1c6998ee19f5a5acbc623ad8ae5b1ea236287c3ccb11bff4da7466e579be5345c95e0f4
-
SSDEEP
6144:2ztLLGL0k61GTfTzu8YYWXbVYyvLj5BcGJpR4J7r4rvv7gSZ1Ks:SLLGQk61aTaFfpYOLNBNLR49r47v8SZM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-