General
-
Target
c5f69982438283b393ad18d61a552bef9c039ad1a947ecf735960b8e83028816
-
Size
940KB
-
Sample
230413-pa1jssce9z
-
MD5
9766eef2b07fb2ced474a840846c350a
-
SHA1
b9c5ce2dd20585d2476aae05f6731f04cd026d88
-
SHA256
c5f69982438283b393ad18d61a552bef9c039ad1a947ecf735960b8e83028816
-
SHA512
70a9660a3a83d19fbf9743bfbab5fd9a256f0c58f18d25afa37ce5728fe9f86cd80bad6663efb004442037c56cf7949b1f9e8f3aabfff5f341ca24dd3f3f506a
-
SSDEEP
24576:eyaXf818BocfrruSZWY4k/h7UJxo/aAkg:tUA8Boc2nYp/pU7o
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
c5f69982438283b393ad18d61a552bef9c039ad1a947ecf735960b8e83028816
-
Size
940KB
-
MD5
9766eef2b07fb2ced474a840846c350a
-
SHA1
b9c5ce2dd20585d2476aae05f6731f04cd026d88
-
SHA256
c5f69982438283b393ad18d61a552bef9c039ad1a947ecf735960b8e83028816
-
SHA512
70a9660a3a83d19fbf9743bfbab5fd9a256f0c58f18d25afa37ce5728fe9f86cd80bad6663efb004442037c56cf7949b1f9e8f3aabfff5f341ca24dd3f3f506a
-
SSDEEP
24576:eyaXf818BocfrruSZWY4k/h7UJxo/aAkg:tUA8Boc2nYp/pU7o
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-