General
-
Target
d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6
-
Size
1.0MB
-
Sample
230414-gj4c2sgd92
-
MD5
6337986c1cf50ac1dc0ef72e98af3a09
-
SHA1
bc55e6911d2c57349eb36915557bc182b33b3431
-
SHA256
d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6
-
SHA512
1b2e8674a69d924db3e4a633905ac6160719550a8b1f81e5012128b7c12d7be1a4dc7820b1c3c04f8c83c95c5e135105fc67452d671935e2f9c514514766760c
-
SSDEEP
24576:tyWX2pX94gVBDUF3pVWftLxlOHfSSm2o0owhqwkxwG0:Io2pX99/DiIxwHxo0xg
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6
-
Size
1.0MB
-
MD5
6337986c1cf50ac1dc0ef72e98af3a09
-
SHA1
bc55e6911d2c57349eb36915557bc182b33b3431
-
SHA256
d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6
-
SHA512
1b2e8674a69d924db3e4a633905ac6160719550a8b1f81e5012128b7c12d7be1a4dc7820b1c3c04f8c83c95c5e135105fc67452d671935e2f9c514514766760c
-
SSDEEP
24576:tyWX2pX94gVBDUF3pVWftLxlOHfSSm2o0owhqwkxwG0:Io2pX99/DiIxwHxo0xg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-