General
-
Target
ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877
-
Size
801KB
-
Sample
230410-yey17sfg85
-
MD5
dde9198f8ae10cc89681066e964d22f4
-
SHA1
9a640a75770d2938b40f05eddf1360a665537919
-
SHA256
ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877
-
SHA512
83b4f2aa1e1878dfad62cbd0c2909ddbac15a7c78297011cc48051efcb57f007131f4312d15bba160414a1ae054006f820cc8f74798836ff3f7fde4026055a11
-
SSDEEP
12288:rMrLy90+pc6r2ppxlI5rjj7+Nyy48U7wVaxK7C4g+cfJyk83ZKmdeMcHkbWoIyt:wyHp/rUIdSyNb84xf/DfJ2NsMcHkbHt
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877
-
Size
801KB
-
MD5
dde9198f8ae10cc89681066e964d22f4
-
SHA1
9a640a75770d2938b40f05eddf1360a665537919
-
SHA256
ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877
-
SHA512
83b4f2aa1e1878dfad62cbd0c2909ddbac15a7c78297011cc48051efcb57f007131f4312d15bba160414a1ae054006f820cc8f74798836ff3f7fde4026055a11
-
SSDEEP
12288:rMrLy90+pc6r2ppxlI5rjj7+Nyy48U7wVaxK7C4g+cfJyk83ZKmdeMcHkbWoIyt:wyHp/rUIdSyNb84xf/DfJ2NsMcHkbHt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-