General
-
Target
45f14f16cdad9d6f7afac550731558fce7709e70306d50717c930620fc13b26b
-
Size
1.5MB
-
Sample
230413-cg84asgf64
-
MD5
dceaa7ac846cca917d0293c6623acba9
-
SHA1
7df4667644ffadc9ca3c499f90e9484d8cfa835e
-
SHA256
45f14f16cdad9d6f7afac550731558fce7709e70306d50717c930620fc13b26b
-
SHA512
c268fe8e45ccb601015e1766ce12c8e8c839f353091e6429f206d42f7666051647e348db969b34ff748a410673b3f9d5cca2afd8086924ac6724e8042fa6546f
-
SSDEEP
49152:J4BugFmpqCID4yFZbPlyT6p8/bxbAy3T6IZ5:HMmpNIDFFJPKfx0Xq
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
mari
185.161.248.90:4125
-
auth_value
55a059e2793efc70d441ee368eba8733
Targets
-
-
Target
45f14f16cdad9d6f7afac550731558fce7709e70306d50717c930620fc13b26b
-
Size
1.5MB
-
MD5
dceaa7ac846cca917d0293c6623acba9
-
SHA1
7df4667644ffadc9ca3c499f90e9484d8cfa835e
-
SHA256
45f14f16cdad9d6f7afac550731558fce7709e70306d50717c930620fc13b26b
-
SHA512
c268fe8e45ccb601015e1766ce12c8e8c839f353091e6429f206d42f7666051647e348db969b34ff748a410673b3f9d5cca2afd8086924ac6724e8042fa6546f
-
SSDEEP
49152:J4BugFmpqCID4yFZbPlyT6p8/bxbAy3T6IZ5:HMmpNIDFFJPKfx0Xq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-