General
-
Target
4a3c32b79315b08d41bd0aaf7bf8b57ef3f92a43c64cc19a18758be3cbe34fc4
-
Size
1.1MB
-
Sample
230413-httf9sbc9v
-
MD5
6414f525c3781d8dfc7bbf08d1c3223f
-
SHA1
6f94d112a5326800e5443d766598bbed083d1f30
-
SHA256
4a3c32b79315b08d41bd0aaf7bf8b57ef3f92a43c64cc19a18758be3cbe34fc4
-
SHA512
f57e23230ad0c9cd9929f5f387b0d3b68576271304131cd2399dd77c7408211d3a3644d81ea22a1b7dcb5a29e40189bd41788d5c4fbc8010ebb5f5689689e54b
-
SSDEEP
24576:ryCXpOnrS+fv79pebLt35qQ0K5KR410u:eEpOumwl30Q0HM0
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
4a3c32b79315b08d41bd0aaf7bf8b57ef3f92a43c64cc19a18758be3cbe34fc4
-
Size
1.1MB
-
MD5
6414f525c3781d8dfc7bbf08d1c3223f
-
SHA1
6f94d112a5326800e5443d766598bbed083d1f30
-
SHA256
4a3c32b79315b08d41bd0aaf7bf8b57ef3f92a43c64cc19a18758be3cbe34fc4
-
SHA512
f57e23230ad0c9cd9929f5f387b0d3b68576271304131cd2399dd77c7408211d3a3644d81ea22a1b7dcb5a29e40189bd41788d5c4fbc8010ebb5f5689689e54b
-
SSDEEP
24576:ryCXpOnrS+fv79pebLt35qQ0K5KR410u:eEpOumwl30Q0HM0
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-