General
-
Target
0c047b744499bbd071acf1fc1176a935b6206d0eb9a9f0b39849d3924a47ae66
-
Size
1.0MB
-
Sample
230412-vep7hsfb2t
-
MD5
297b9db520b6198ec312a0b53e173ad9
-
SHA1
95bb11468fa16c9379d899c6e13c05efac346d4d
-
SHA256
0c047b744499bbd071acf1fc1176a935b6206d0eb9a9f0b39849d3924a47ae66
-
SHA512
3e828646b68201b79bc1d404fd26a16e12af99f5e4f4e67261f2fc422dadd9b898e13b908dddd5ee2069e5c0bc18d7faecc436f1ba0879a5d2f4dd1395abdf2b
-
SSDEEP
24576:Fy1kiYI56Iq7NxmCfqEAJQzUVPRQ5RW1Lgvg7dk1lDRd:gOizgIGNxytGUVPoRW1Lgvqu3d
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
0c047b744499bbd071acf1fc1176a935b6206d0eb9a9f0b39849d3924a47ae66
-
Size
1.0MB
-
MD5
297b9db520b6198ec312a0b53e173ad9
-
SHA1
95bb11468fa16c9379d899c6e13c05efac346d4d
-
SHA256
0c047b744499bbd071acf1fc1176a935b6206d0eb9a9f0b39849d3924a47ae66
-
SHA512
3e828646b68201b79bc1d404fd26a16e12af99f5e4f4e67261f2fc422dadd9b898e13b908dddd5ee2069e5c0bc18d7faecc436f1ba0879a5d2f4dd1395abdf2b
-
SSDEEP
24576:Fy1kiYI56Iq7NxmCfqEAJQzUVPRQ5RW1Lgvg7dk1lDRd:gOizgIGNxytGUVPoRW1Lgvqu3d
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-