General
-
Target
c9d78ef7980ccc60e45d8eb8414d53dc2471d362e136ed280245449edb51ea3a
-
Size
1.2MB
-
Sample
230414-g7k7dagf63
-
MD5
b784d1f03624966979c8b7e49561cfb9
-
SHA1
1b644e755f4321d01cff3e245211d975c5bc14f0
-
SHA256
c9d78ef7980ccc60e45d8eb8414d53dc2471d362e136ed280245449edb51ea3a
-
SHA512
0c532545c1b72f72f2c569caf10683c0e377d9377c1b4a115e14071b7fc340f3ddfd6f89394df88254c7c70052445aabada3baa972372dc738d45dd279399d24
-
SSDEEP
24576:dyCU5DwYWEugpTp/8VhNcLHC9bCuskzBgtxOO:4CQwYu+TpUeHEuszBgO
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
c9d78ef7980ccc60e45d8eb8414d53dc2471d362e136ed280245449edb51ea3a
-
Size
1.2MB
-
MD5
b784d1f03624966979c8b7e49561cfb9
-
SHA1
1b644e755f4321d01cff3e245211d975c5bc14f0
-
SHA256
c9d78ef7980ccc60e45d8eb8414d53dc2471d362e136ed280245449edb51ea3a
-
SHA512
0c532545c1b72f72f2c569caf10683c0e377d9377c1b4a115e14071b7fc340f3ddfd6f89394df88254c7c70052445aabada3baa972372dc738d45dd279399d24
-
SSDEEP
24576:dyCU5DwYWEugpTp/8VhNcLHC9bCuskzBgtxOO:4CQwYu+TpUeHEuszBgO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-