General
-
Target
f9dbcfcc73c98844bedc4dd01e3f604b9075e9a0e7366ca9db0eb9a0b3dfdfb5
-
Size
962KB
-
Sample
230413-1vba7afh9t
-
MD5
6be6617f918562b60f1d64c23bc10e8a
-
SHA1
4511087a981823bb5e56eedbcfdf00803be7b662
-
SHA256
f9dbcfcc73c98844bedc4dd01e3f604b9075e9a0e7366ca9db0eb9a0b3dfdfb5
-
SHA512
e06dda8e498b4d3cf456862d898279f23a5622a3f8ad03eaa7835a8d4276c0db1bc5ff7b3c29474f0a209143187835f76e7bd642103a2f7c3c4e8678a72c5f92
-
SSDEEP
24576:WyVGRTOFcmq7dNeECWKZjWD0HsbkmXwHoS:lFJUNenZjJIR
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
f9dbcfcc73c98844bedc4dd01e3f604b9075e9a0e7366ca9db0eb9a0b3dfdfb5
-
Size
962KB
-
MD5
6be6617f918562b60f1d64c23bc10e8a
-
SHA1
4511087a981823bb5e56eedbcfdf00803be7b662
-
SHA256
f9dbcfcc73c98844bedc4dd01e3f604b9075e9a0e7366ca9db0eb9a0b3dfdfb5
-
SHA512
e06dda8e498b4d3cf456862d898279f23a5622a3f8ad03eaa7835a8d4276c0db1bc5ff7b3c29474f0a209143187835f76e7bd642103a2f7c3c4e8678a72c5f92
-
SSDEEP
24576:WyVGRTOFcmq7dNeECWKZjWD0HsbkmXwHoS:lFJUNenZjJIR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-