General
-
Target
8b38f70fc7777e90566b6154b9387ae1b933eb602a88806ddc9ebe19bd01f4c1
-
Size
1.2MB
-
Sample
230414-d96z3shd7v
-
MD5
c7e312ffa9d2c7ad9fa5c4eae8ce796e
-
SHA1
ab7fa52096cb604519b501ba1e225be0823f1f2c
-
SHA256
8b38f70fc7777e90566b6154b9387ae1b933eb602a88806ddc9ebe19bd01f4c1
-
SHA512
b79b3feacce122f825a6371c1d3c5db75ae414ef2e00f106d7e621008bfedf6a754abc516405cfb1d07d3b796ed2bfe794c1700455b7de959fe47129c991814f
-
SSDEEP
24576:5yXmI6uskA7FPDuur65bdunP5bRlY+urD8SZJoPCRTFMzJ:sGus3ZSu25bGP5VkD8SfmCRTFg
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
8b38f70fc7777e90566b6154b9387ae1b933eb602a88806ddc9ebe19bd01f4c1
-
Size
1.2MB
-
MD5
c7e312ffa9d2c7ad9fa5c4eae8ce796e
-
SHA1
ab7fa52096cb604519b501ba1e225be0823f1f2c
-
SHA256
8b38f70fc7777e90566b6154b9387ae1b933eb602a88806ddc9ebe19bd01f4c1
-
SHA512
b79b3feacce122f825a6371c1d3c5db75ae414ef2e00f106d7e621008bfedf6a754abc516405cfb1d07d3b796ed2bfe794c1700455b7de959fe47129c991814f
-
SSDEEP
24576:5yXmI6uskA7FPDuur65bdunP5bRlY+urD8SZJoPCRTFMzJ:sGus3ZSu25bGP5VkD8SfmCRTFg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-