General
-
Target
bb8395e0d203dc6529519036ed32b8ece59fa805dc56b5215027e296cc12ad32
-
Size
854KB
-
Sample
230411-z1z13afd93
-
MD5
df70e76f6c2ffbf6e5957a38f8a37a5f
-
SHA1
e2fe2ba4175e5685c8a4c22f38acc875eec771a2
-
SHA256
bb8395e0d203dc6529519036ed32b8ece59fa805dc56b5215027e296cc12ad32
-
SHA512
acc47dd3ff283a2763f7092a0bc1c6f41fc458c935b7d5056f75e038d579de11c86afc63921b9642a4a93ce6ce5cdd845db295c7de85d38a34749cc813f41dbf
-
SSDEEP
24576:GytbDTvY6siRfE5E/cPKrOq+dF6w96YLU:VtbDkORMi/cirp01tL
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Targets
-
-
Target
bb8395e0d203dc6529519036ed32b8ece59fa805dc56b5215027e296cc12ad32
-
Size
854KB
-
MD5
df70e76f6c2ffbf6e5957a38f8a37a5f
-
SHA1
e2fe2ba4175e5685c8a4c22f38acc875eec771a2
-
SHA256
bb8395e0d203dc6529519036ed32b8ece59fa805dc56b5215027e296cc12ad32
-
SHA512
acc47dd3ff283a2763f7092a0bc1c6f41fc458c935b7d5056f75e038d579de11c86afc63921b9642a4a93ce6ce5cdd845db295c7de85d38a34749cc813f41dbf
-
SSDEEP
24576:GytbDTvY6siRfE5E/cPKrOq+dF6w96YLU:VtbDkORMi/cirp01tL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-