General
-
Target
f49e4ff935028c6844fbcca7341ebc40237dc5ab9eb4bd4396cba041a8cb3593
-
Size
1.2MB
-
Sample
230413-dasneagg82
-
MD5
53645ac5c561f04e7dcdc449dc5e2385
-
SHA1
32c35338434463e43e8c48ede9a30512e0ec1b7e
-
SHA256
f49e4ff935028c6844fbcca7341ebc40237dc5ab9eb4bd4396cba041a8cb3593
-
SHA512
90af40ec981ab84910d2964620d32c90666bedd6610a414a1974de8ffc1c85fb8367966a8271974eaf642b4354de50164732b76bdcd233ba1a796921fb614d6e
-
SSDEEP
24576:2yhmMS8sjFALVhe9wPMncyh6ebOOgm8j6X3TQeGOK58dtu+jF:FhmAsxkVkK6Kk863TdG/5elj
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
f49e4ff935028c6844fbcca7341ebc40237dc5ab9eb4bd4396cba041a8cb3593
-
Size
1.2MB
-
MD5
53645ac5c561f04e7dcdc449dc5e2385
-
SHA1
32c35338434463e43e8c48ede9a30512e0ec1b7e
-
SHA256
f49e4ff935028c6844fbcca7341ebc40237dc5ab9eb4bd4396cba041a8cb3593
-
SHA512
90af40ec981ab84910d2964620d32c90666bedd6610a414a1974de8ffc1c85fb8367966a8271974eaf642b4354de50164732b76bdcd233ba1a796921fb614d6e
-
SSDEEP
24576:2yhmMS8sjFALVhe9wPMncyh6ebOOgm8j6X3TQeGOK58dtu+jF:FhmAsxkVkK6Kk863TdG/5elj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-