General
-
Target
0b59d97605d1b0f5980fe4f7fa42b3bc9f0cb2429fef78af34ca905373dd26ee
-
Size
1.0MB
-
Sample
230414-gxexlsge89
-
MD5
97cdd02e950aeb0303a5e6538fa85283
-
SHA1
7c47684aa6a4d6b26793338360754674ed89ccc5
-
SHA256
0b59d97605d1b0f5980fe4f7fa42b3bc9f0cb2429fef78af34ca905373dd26ee
-
SHA512
70ed7a535538ca57f2926fce2d3325db377e87e9390a0aeb16f12848f758c712dcf4b4901f1b8dcde04e478b26681b7fb96e68dd9e2b2a0b5e07fbb284511bba
-
SSDEEP
24576:dyHdpTNkr832TrVVeHLzwWs108cFmizLquQ5LoZ:4zQrEzde08kL3QJo
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
0b59d97605d1b0f5980fe4f7fa42b3bc9f0cb2429fef78af34ca905373dd26ee
-
Size
1.0MB
-
MD5
97cdd02e950aeb0303a5e6538fa85283
-
SHA1
7c47684aa6a4d6b26793338360754674ed89ccc5
-
SHA256
0b59d97605d1b0f5980fe4f7fa42b3bc9f0cb2429fef78af34ca905373dd26ee
-
SHA512
70ed7a535538ca57f2926fce2d3325db377e87e9390a0aeb16f12848f758c712dcf4b4901f1b8dcde04e478b26681b7fb96e68dd9e2b2a0b5e07fbb284511bba
-
SSDEEP
24576:dyHdpTNkr832TrVVeHLzwWs108cFmizLquQ5LoZ:4zQrEzde08kL3QJo
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-