General
-
Target
011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80
-
Size
801KB
-
Sample
230410-yan1fafg57
-
MD5
e02f44a7a0fed53f967b5e23dc6397ea
-
SHA1
db93bd057a6b03e308878d35bce52ca4b5ffa5e9
-
SHA256
011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80
-
SHA512
2e8093344e60dd66aea0ff7b7106b4327a302d1a87fa682d4894e80b432511fe23bf26f29c9da8217576ca5be5f51fc97b6c989b94aa785e8b03658dc3e2e752
-
SSDEEP
12288:IMrMy90/oq7l3pk/hlmmV4ACJftSxK7CX8l74PtpGxYxCbPhHg2aX:UyqoqlUBV4AEfQxfs4PuxYxUHgHX
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80
-
Size
801KB
-
MD5
e02f44a7a0fed53f967b5e23dc6397ea
-
SHA1
db93bd057a6b03e308878d35bce52ca4b5ffa5e9
-
SHA256
011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80
-
SHA512
2e8093344e60dd66aea0ff7b7106b4327a302d1a87fa682d4894e80b432511fe23bf26f29c9da8217576ca5be5f51fc97b6c989b94aa785e8b03658dc3e2e752
-
SSDEEP
12288:IMrMy90/oq7l3pk/hlmmV4ACJftSxK7CX8l74PtpGxYxCbPhHg2aX:UyqoqlUBV4AEfQxfs4PuxYxUHgHX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-