General
-
Target
86e04407dd16424ca4092a92bedaa961ce1cf89e05f7187794342a62bc28120a
-
Size
940KB
-
Sample
230413-qxk83ada8z
-
MD5
1a2c90ff28af428fca34e56320fbec88
-
SHA1
517bf2995c3c048fef2d91f248f3549238793a6d
-
SHA256
86e04407dd16424ca4092a92bedaa961ce1cf89e05f7187794342a62bc28120a
-
SHA512
7eb6a4f21a1d98c7e9347d709f67d8503f42a0d914fa603488e2fe351f5fa822573ecf350c6e931740de4cf29d2cdcc2524581d4bddb185bce42b85d91708a1c
-
SSDEEP
24576:vylRe0mMydLygKTnBtANtJnYTmJsb08Cktv6:6reL3s0NsyybX
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
86e04407dd16424ca4092a92bedaa961ce1cf89e05f7187794342a62bc28120a
-
Size
940KB
-
MD5
1a2c90ff28af428fca34e56320fbec88
-
SHA1
517bf2995c3c048fef2d91f248f3549238793a6d
-
SHA256
86e04407dd16424ca4092a92bedaa961ce1cf89e05f7187794342a62bc28120a
-
SHA512
7eb6a4f21a1d98c7e9347d709f67d8503f42a0d914fa603488e2fe351f5fa822573ecf350c6e931740de4cf29d2cdcc2524581d4bddb185bce42b85d91708a1c
-
SSDEEP
24576:vylRe0mMydLygKTnBtANtJnYTmJsb08Cktv6:6reL3s0NsyybX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-