General
-
Target
97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131
-
Size
1.0MB
-
Sample
230414-hnclkaab8z
-
MD5
49a5742928cc7a9247779618cd571eaa
-
SHA1
9182a240b8ef36daf63efd0de01b8aaa11ee4789
-
SHA256
97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131
-
SHA512
71210abe5e0824495c4cf52777577fee15fe6f217504c4c776c711dceac31475761b72842ffc7f11d4c12db5b45288a17fe555903a49c9ad93377c0e6912fb82
-
SSDEEP
24576:KyiFarFmoSWdXVVrgLIn+SXXJhJ+x3EV:RXxSWpII+uX3cx3E
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131
-
Size
1.0MB
-
MD5
49a5742928cc7a9247779618cd571eaa
-
SHA1
9182a240b8ef36daf63efd0de01b8aaa11ee4789
-
SHA256
97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131
-
SHA512
71210abe5e0824495c4cf52777577fee15fe6f217504c4c776c711dceac31475761b72842ffc7f11d4c12db5b45288a17fe555903a49c9ad93377c0e6912fb82
-
SSDEEP
24576:KyiFarFmoSWdXVVrgLIn+SXXJhJ+x3EV:RXxSWpII+uX3cx3E
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-