General
-
Target
b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3
-
Size
1.0MB
-
Sample
230414-f8m7pagd47
-
MD5
3951b6877c31c6de9d31da5aac42058e
-
SHA1
e41fa06c0aefb1bf4b629fcbf1eb517bb3a204b7
-
SHA256
b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3
-
SHA512
8ce5e6ea372d376245d7ad9de53cbbd8a4f926173ecaf9d81ed45bf21c2c9f6d05cfdd2f1f27729d86d57d6db83dc9c29976fa5db0fb2869d3f39a11e09d510a
-
SSDEEP
24576:xyd6v2au+MGwons9M/EWola7ozKSvJjRE1PAGjTyRyign:k8O+Qo6MNMzKShdE1nIh
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3
-
Size
1.0MB
-
MD5
3951b6877c31c6de9d31da5aac42058e
-
SHA1
e41fa06c0aefb1bf4b629fcbf1eb517bb3a204b7
-
SHA256
b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3
-
SHA512
8ce5e6ea372d376245d7ad9de53cbbd8a4f926173ecaf9d81ed45bf21c2c9f6d05cfdd2f1f27729d86d57d6db83dc9c29976fa5db0fb2869d3f39a11e09d510a
-
SSDEEP
24576:xyd6v2au+MGwons9M/EWola7ozKSvJjRE1PAGjTyRyign:k8O+Qo6MNMzKShdE1nIh
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-