General
-
Target
fabbba0f52565e13f11156fd5a0f761eeb0b797fc6389b9e323b41705e8d705b
-
Size
1.0MB
-
Sample
230413-cl6tqsgf87
-
MD5
9310034b57024a6909623cffa9190c8a
-
SHA1
2659fa40af40049d181aa45bfb2f615e47b2cbdd
-
SHA256
fabbba0f52565e13f11156fd5a0f761eeb0b797fc6389b9e323b41705e8d705b
-
SHA512
e805cbe4e32fb0c971de0b33415f3d8063f4e440a831e80c063400b5e520e93c48d1886bfa7281d9e8d8c00abdf14988e45c104a365ff3c6a00677eb023abc0b
-
SSDEEP
24576:ByoY0swJSB6z9WH51SKRaaI1SWWLof9Bj/dm8r3K1E4MihhBknlkoAEqs:0jJSSBG901SK4aqc6Jo8m1EIrnEq
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
fabbba0f52565e13f11156fd5a0f761eeb0b797fc6389b9e323b41705e8d705b
-
Size
1.0MB
-
MD5
9310034b57024a6909623cffa9190c8a
-
SHA1
2659fa40af40049d181aa45bfb2f615e47b2cbdd
-
SHA256
fabbba0f52565e13f11156fd5a0f761eeb0b797fc6389b9e323b41705e8d705b
-
SHA512
e805cbe4e32fb0c971de0b33415f3d8063f4e440a831e80c063400b5e520e93c48d1886bfa7281d9e8d8c00abdf14988e45c104a365ff3c6a00677eb023abc0b
-
SSDEEP
24576:ByoY0swJSB6z9WH51SKRaaI1SWWLof9Bj/dm8r3K1E4MihhBknlkoAEqs:0jJSSBG901SK4aqc6Jo8m1EIrnEq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-