General
-
Target
2be47d7d71ad1b619818d5bc3a4b8a2b3960487a9dde4f931c8ec91515f7716b
-
Size
1.2MB
-
Sample
230412-1l4w5sfe28
-
MD5
cd289d5b5d2cf01f6f7189f54f805fc4
-
SHA1
607f728c709eac51a9e3fd2e9a62a83604bdc2a8
-
SHA256
2be47d7d71ad1b619818d5bc3a4b8a2b3960487a9dde4f931c8ec91515f7716b
-
SHA512
ce4cc22264719c2bd405152ce63a341b77b64a01538282accaab267c782b81cf1526355bdf8996cd9e2a0fd45d3366794f5ca6782e63543dcfffb6e55f65f4b5
-
SSDEEP
24576:gyzDAfxghjW4NpgeE2cjulYRYOC4k9YfNKKk:nrWwghtVk/K
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
2be47d7d71ad1b619818d5bc3a4b8a2b3960487a9dde4f931c8ec91515f7716b
-
Size
1.2MB
-
MD5
cd289d5b5d2cf01f6f7189f54f805fc4
-
SHA1
607f728c709eac51a9e3fd2e9a62a83604bdc2a8
-
SHA256
2be47d7d71ad1b619818d5bc3a4b8a2b3960487a9dde4f931c8ec91515f7716b
-
SHA512
ce4cc22264719c2bd405152ce63a341b77b64a01538282accaab267c782b81cf1526355bdf8996cd9e2a0fd45d3366794f5ca6782e63543dcfffb6e55f65f4b5
-
SSDEEP
24576:gyzDAfxghjW4NpgeE2cjulYRYOC4k9YfNKKk:nrWwghtVk/K
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-