General
-
Target
bb7409f225cf0c8e9af3a348534485ae433827cd004f7e0b6b64ac9a1126f50c
-
Size
1.5MB
-
Sample
230414-fsaxeshf8y
-
MD5
c9858e013a91e25c7fc3e98b5d599b03
-
SHA1
2c4ce616abd3486661bb5e58a4ad498214a88614
-
SHA256
bb7409f225cf0c8e9af3a348534485ae433827cd004f7e0b6b64ac9a1126f50c
-
SHA512
c3db9ec945299ccfa4f4f9d9497b754a9c6c7ca824c74bf9b46144116104399fab52ab8d4cd68551540d2b8d2595dea6328b3dbd4a02e6f23d6400868dcbb086
-
SSDEEP
49152:l21BvDzXXQbnDbBTl/NAbAk04dhaRBkhJU4:U1BvAbvBTl/Nbk0CgR+hP
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
masi
185.161.248.90:4125
-
auth_value
6e26457e57602c4cf35356c36d8dd8e8
Targets
-
-
Target
bb7409f225cf0c8e9af3a348534485ae433827cd004f7e0b6b64ac9a1126f50c
-
Size
1.5MB
-
MD5
c9858e013a91e25c7fc3e98b5d599b03
-
SHA1
2c4ce616abd3486661bb5e58a4ad498214a88614
-
SHA256
bb7409f225cf0c8e9af3a348534485ae433827cd004f7e0b6b64ac9a1126f50c
-
SHA512
c3db9ec945299ccfa4f4f9d9497b754a9c6c7ca824c74bf9b46144116104399fab52ab8d4cd68551540d2b8d2595dea6328b3dbd4a02e6f23d6400868dcbb086
-
SSDEEP
49152:l21BvDzXXQbnDbBTl/NAbAk04dhaRBkhJU4:U1BvAbvBTl/Nbk0CgR+hP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-