General
-
Target
e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd
-
Size
801KB
-
Sample
230410-z74b3agd29
-
MD5
dcd5801b10da4fd62c37277d63c2d325
-
SHA1
40f70eb32def75d4d5c35b6b1d9a220bb5914bca
-
SHA256
e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd
-
SHA512
907631659c4465546869e2fabcdf52e1510ba0b6d4c93c4dd7d2051b0e98ea434e4d3c90b59bb474d66da4d62b56c51c140667654209e1c32e07c90cd1bf2d4e
-
SSDEEP
24576:LyKJptPSMvT72HUDxfy4R0Sl/Fh3nownbxHH8Qk6bwi:+KbtS05Dx64eSl9KQd8XYw
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd
-
Size
801KB
-
MD5
dcd5801b10da4fd62c37277d63c2d325
-
SHA1
40f70eb32def75d4d5c35b6b1d9a220bb5914bca
-
SHA256
e1dea6c0b807ff2455838fb511b781695b3908f835b27f2dfb0d397cfc1c41fd
-
SHA512
907631659c4465546869e2fabcdf52e1510ba0b6d4c93c4dd7d2051b0e98ea434e4d3c90b59bb474d66da4d62b56c51c140667654209e1c32e07c90cd1bf2d4e
-
SSDEEP
24576:LyKJptPSMvT72HUDxfy4R0Sl/Fh3nownbxHH8Qk6bwi:+KbtS05Dx64eSl9KQd8XYw
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-