General
-
Target
1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603
-
Size
1.1MB
-
Sample
230413-h7g1dsaa63
-
MD5
d61cc9e46758eb1d393c21e750824da4
-
SHA1
293a7007466e790aeb968f141d68833472e80d79
-
SHA256
1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603
-
SHA512
3c149e68b0237a46c013a7cb3ba8edee07cb75527b3344b22d553b195b8082c7309d647d29e2fbf588d6e7b47e8294dd797ae86fcfa7bbf8040335140d0febf0
-
SSDEEP
24576:uyzcfJ3P9cueWSsCtedM8OqbDjisyryvg5105:9qJVGWfCtD8HbDOT0
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603
-
Size
1.1MB
-
MD5
d61cc9e46758eb1d393c21e750824da4
-
SHA1
293a7007466e790aeb968f141d68833472e80d79
-
SHA256
1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603
-
SHA512
3c149e68b0237a46c013a7cb3ba8edee07cb75527b3344b22d553b195b8082c7309d647d29e2fbf588d6e7b47e8294dd797ae86fcfa7bbf8040335140d0febf0
-
SSDEEP
24576:uyzcfJ3P9cueWSsCtedM8OqbDjisyryvg5105:9qJVGWfCtD8HbDOT0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-