General
-
Target
bfaedf7e0129ae9339d6b6db2c9f3f0c10672ddca84ddd4e13abc593c8e39c38
-
Size
1.1MB
-
Sample
230413-sra71sdf2z
-
MD5
aab703db6f8fbb055e3439cd1c99c231
-
SHA1
3c70ee2a9d0b6fd0eb4613783007bc68f3796efa
-
SHA256
bfaedf7e0129ae9339d6b6db2c9f3f0c10672ddca84ddd4e13abc593c8e39c38
-
SHA512
1abd7f73c23d9ba28790b3214051a1b3628015036f7ebe91bd7c5164109a55541aae9852f8e5a401a1b4094102c951ea4f704880f6a0464633cf0326d330f042
-
SSDEEP
24576:DysR66BTry5q3dZGesvCjFgRHaEYl/I7h1a3:WsR6qryjx6CaEYow
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
bfaedf7e0129ae9339d6b6db2c9f3f0c10672ddca84ddd4e13abc593c8e39c38
-
Size
1.1MB
-
MD5
aab703db6f8fbb055e3439cd1c99c231
-
SHA1
3c70ee2a9d0b6fd0eb4613783007bc68f3796efa
-
SHA256
bfaedf7e0129ae9339d6b6db2c9f3f0c10672ddca84ddd4e13abc593c8e39c38
-
SHA512
1abd7f73c23d9ba28790b3214051a1b3628015036f7ebe91bd7c5164109a55541aae9852f8e5a401a1b4094102c951ea4f704880f6a0464633cf0326d330f042
-
SSDEEP
24576:DysR66BTry5q3dZGesvCjFgRHaEYl/I7h1a3:WsR6qryjx6CaEYow
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-