General
-
Target
bb0dc08b807327e5f914a0a3dad75b25c65db028ffe2ef5ff96bb55c9a7eafdf
-
Size
944KB
-
Sample
230414-chlz6aha2v
-
MD5
412b9655177f05168aa3ca99da7a78f3
-
SHA1
d4533b7e0cdb5efea7666a6eb883aa3dd478d60e
-
SHA256
bb0dc08b807327e5f914a0a3dad75b25c65db028ffe2ef5ff96bb55c9a7eafdf
-
SHA512
0e581e66b1007252d696864da806308758aab3c6eeffae2b8792ec61de2033b2b796957d4500de127af2b60861d3288abe83ea44150e332d8530a8ec7cb2f43c
-
SSDEEP
24576:Ny8cP8RNGC+l85CGpN1b533VTGz+N4s35bvo:o8EUNusz1bFJGze7Jbv
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
bb0dc08b807327e5f914a0a3dad75b25c65db028ffe2ef5ff96bb55c9a7eafdf
-
Size
944KB
-
MD5
412b9655177f05168aa3ca99da7a78f3
-
SHA1
d4533b7e0cdb5efea7666a6eb883aa3dd478d60e
-
SHA256
bb0dc08b807327e5f914a0a3dad75b25c65db028ffe2ef5ff96bb55c9a7eafdf
-
SHA512
0e581e66b1007252d696864da806308758aab3c6eeffae2b8792ec61de2033b2b796957d4500de127af2b60861d3288abe83ea44150e332d8530a8ec7cb2f43c
-
SSDEEP
24576:Ny8cP8RNGC+l85CGpN1b533VTGz+N4s35bvo:o8EUNusz1bFJGze7Jbv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-