General
-
Target
456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e
-
Size
1.0MB
-
Sample
230414-drlw7ahc7x
-
MD5
78da20c1cea5a67e30ba8a61a2c3da04
-
SHA1
b0de94d667d7de0c3760aa933bbea4cc32a268b2
-
SHA256
456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e
-
SHA512
ca82cbb627ecf135cff7d881dd19d0860afefefffdc42d109011f68041dc686935b2a3fc0defc36809b78ea71b0939a45497664ad4fbbc7fd375377a128598b0
-
SSDEEP
24576:lypJpa5wN8l3gaMSAej1WVNRh+fn+CTdACQF:ApTa68l3gaMvnjh3n
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e
-
Size
1.0MB
-
MD5
78da20c1cea5a67e30ba8a61a2c3da04
-
SHA1
b0de94d667d7de0c3760aa933bbea4cc32a268b2
-
SHA256
456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e
-
SHA512
ca82cbb627ecf135cff7d881dd19d0860afefefffdc42d109011f68041dc686935b2a3fc0defc36809b78ea71b0939a45497664ad4fbbc7fd375377a128598b0
-
SSDEEP
24576:lypJpa5wN8l3gaMSAej1WVNRh+fn+CTdACQF:ApTa68l3gaMvnjh3n
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-