General
-
Target
fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a
-
Size
1.2MB
-
Sample
230414-dtaa6sfh55
-
MD5
192b9b2d9c93005ad91c55cd6e201424
-
SHA1
bfb09bd9b9d6b4f847cbc7cb7e4842102113a076
-
SHA256
fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a
-
SHA512
e12fedc503815e787e4fb5ed175fd3010dd54afda4065f77d36485d521bdba1a41ca6cbb5ebe40a9b33681f8b5068177dd9cefbc3f9a31884f9d7b30f689d728
-
SSDEEP
24576:gyiG8TBpcbjKEVZcrPHSPsY8Fg6oSZJYR3cYf2w0nM/xn:nONpp7Hza6oSfo3l0nM/x
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a
-
Size
1.2MB
-
MD5
192b9b2d9c93005ad91c55cd6e201424
-
SHA1
bfb09bd9b9d6b4f847cbc7cb7e4842102113a076
-
SHA256
fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a
-
SHA512
e12fedc503815e787e4fb5ed175fd3010dd54afda4065f77d36485d521bdba1a41ca6cbb5ebe40a9b33681f8b5068177dd9cefbc3f9a31884f9d7b30f689d728
-
SSDEEP
24576:gyiG8TBpcbjKEVZcrPHSPsY8Fg6oSZJYR3cYf2w0nM/xn:nONpp7Hza6oSfo3l0nM/x
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-