General
-
Target
a9f298e77016929f98e495cc986b6fa1e48aa5830e6fcb0fd629952029d36489
-
Size
348KB
-
Sample
230323-pbjbxafe24
-
MD5
c773a337fe0655cdf2927433cff951b6
-
SHA1
bd8354bad10dc43a42e20bfb17f06f370517de0c
-
SHA256
a9f298e77016929f98e495cc986b6fa1e48aa5830e6fcb0fd629952029d36489
-
SHA512
b43e971cd734bee409c97524bb067ccfdfab682a9194512fb71aa8d9171e15bbba786db7fb52142bebcfd562242d719f741d4dfbaa25359852e8b7dbb34bf7cc
-
SSDEEP
6144:a8z/hNLkLlU6mEKniTv/TdH5w/aZL/FoapS:9NLkRU6mJu3T3G0N
Static task
static1
Malware Config
Extracted
redline
dozk
91.215.85.15:25916
-
auth_value
9f1dc4ff242fb8b53742acae0ef96143
Targets
-
-
Target
a9f298e77016929f98e495cc986b6fa1e48aa5830e6fcb0fd629952029d36489
-
Size
348KB
-
MD5
c773a337fe0655cdf2927433cff951b6
-
SHA1
bd8354bad10dc43a42e20bfb17f06f370517de0c
-
SHA256
a9f298e77016929f98e495cc986b6fa1e48aa5830e6fcb0fd629952029d36489
-
SHA512
b43e971cd734bee409c97524bb067ccfdfab682a9194512fb71aa8d9171e15bbba786db7fb52142bebcfd562242d719f741d4dfbaa25359852e8b7dbb34bf7cc
-
SSDEEP
6144:a8z/hNLkLlU6mEKniTv/TdH5w/aZL/FoapS:9NLkRU6mJu3T3G0N
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-