General
-
Target
fead0f0435e2aecfbfa182109ae025983822b877bd7dd05a4d774f3308fc011f
-
Size
962KB
-
Sample
230413-zra1kseb87
-
MD5
e7e19ee24cd61d9f485e611336a6520f
-
SHA1
63003463731c312d555bbc373e07b330efb5e7e0
-
SHA256
fead0f0435e2aecfbfa182109ae025983822b877bd7dd05a4d774f3308fc011f
-
SHA512
ee434df7dd549e80be2e8e5d14228ef15de80d25c33025925f62a9ac986b2b062995b6ca3e4a341faa457590eb820135589d1535dd38c78eef6256a23b758121
-
SSDEEP
24576:IyS9vJNJVcTfe6CFV6YZ4+7cRiO4vzkUmjwj4:PSvdVWfeb6YZH7TO4vzkUm
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
fead0f0435e2aecfbfa182109ae025983822b877bd7dd05a4d774f3308fc011f
-
Size
962KB
-
MD5
e7e19ee24cd61d9f485e611336a6520f
-
SHA1
63003463731c312d555bbc373e07b330efb5e7e0
-
SHA256
fead0f0435e2aecfbfa182109ae025983822b877bd7dd05a4d774f3308fc011f
-
SHA512
ee434df7dd549e80be2e8e5d14228ef15de80d25c33025925f62a9ac986b2b062995b6ca3e4a341faa457590eb820135589d1535dd38c78eef6256a23b758121
-
SSDEEP
24576:IyS9vJNJVcTfe6CFV6YZ4+7cRiO4vzkUmjwj4:PSvdVWfeb6YZH7TO4vzkUm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-