General
-
Target
ef4b347cf7bcedfd164572507e21d4733de10cf14bd1cba44130527da60384bb
-
Size
1.2MB
-
Sample
230414-ftnjxahf9y
-
MD5
24c8abd1d35d74b68004fec5699fee90
-
SHA1
0ffa9d2d2ab87adf9c89b1e2cbe13afa92f2b7ea
-
SHA256
ef4b347cf7bcedfd164572507e21d4733de10cf14bd1cba44130527da60384bb
-
SHA512
f22c5d0f72f560f6a7b82e5bb711509a6a3e6a123359d34698056f46158d77e92372486fe6202c54d71fe23c78485f36d8cc6396afaad3bd950000a64342b2e6
-
SSDEEP
24576:0yqwyvAZwzb+kFkaSMR5MIFm4mYDltqVSZJskdSjmG6gZh:DqwgzCYf75p1rqVSfp0SG64
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
ef4b347cf7bcedfd164572507e21d4733de10cf14bd1cba44130527da60384bb
-
Size
1.2MB
-
MD5
24c8abd1d35d74b68004fec5699fee90
-
SHA1
0ffa9d2d2ab87adf9c89b1e2cbe13afa92f2b7ea
-
SHA256
ef4b347cf7bcedfd164572507e21d4733de10cf14bd1cba44130527da60384bb
-
SHA512
f22c5d0f72f560f6a7b82e5bb711509a6a3e6a123359d34698056f46158d77e92372486fe6202c54d71fe23c78485f36d8cc6396afaad3bd950000a64342b2e6
-
SSDEEP
24576:0yqwyvAZwzb+kFkaSMR5MIFm4mYDltqVSZJskdSjmG6gZh:DqwgzCYf75p1rqVSfp0SG64
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-