General
-
Target
953864245e4f86156416bb5e260eb31961219f1c67c4d0450ce69769f99994e3
-
Size
790KB
-
Sample
230411-eradtsbh5x
-
MD5
3e34efecdef96964c4da9b36611c9203
-
SHA1
eec00022e66782c7bff88aa23dfe15c2b006be30
-
SHA256
953864245e4f86156416bb5e260eb31961219f1c67c4d0450ce69769f99994e3
-
SHA512
e33071e7d83c5ee0ae3eae6959578d79cc708f60c2e9fed615e468a8de5e0a706daaf00f3925e81e9555228d1fd1992884505242fe1b16032f36b65bf8af625e
-
SSDEEP
12288:BMr9y90S7s0YO47FDv/qekYN5prVyW+7h+iRzmYA4iTMaJHIet++n3MM7ODQf/fw:syHzDKDbN7x4FHzCPJoh+3M3k3ovd
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Targets
-
-
Target
953864245e4f86156416bb5e260eb31961219f1c67c4d0450ce69769f99994e3
-
Size
790KB
-
MD5
3e34efecdef96964c4da9b36611c9203
-
SHA1
eec00022e66782c7bff88aa23dfe15c2b006be30
-
SHA256
953864245e4f86156416bb5e260eb31961219f1c67c4d0450ce69769f99994e3
-
SHA512
e33071e7d83c5ee0ae3eae6959578d79cc708f60c2e9fed615e468a8de5e0a706daaf00f3925e81e9555228d1fd1992884505242fe1b16032f36b65bf8af625e
-
SSDEEP
12288:BMr9y90S7s0YO47FDv/qekYN5prVyW+7h+iRzmYA4iTMaJHIet++n3MM7ODQf/fw:syHzDKDbN7x4FHzCPJoh+3M3k3ovd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-