General
-
Target
f9849d3cef4b3b543463d4ac5a0f1b26c835d3fc3aaf99e4254a3bc8ae6a46a9
-
Size
1.0MB
-
Sample
230414-hnyh2aab9v
-
MD5
9c4db766301eefe5e59e78d3b8e9f12e
-
SHA1
056b28c14fe29210e4378486b8949274b9a18a3d
-
SHA256
f9849d3cef4b3b543463d4ac5a0f1b26c835d3fc3aaf99e4254a3bc8ae6a46a9
-
SHA512
f5ae511b56c86f83f79e55733ccf0bc022044c778930b5168a433d0e8be08a48308479ab6b5e6aeceae2c88d755f8abe56a86039682ebb28d289553ea7d8d6fa
-
SSDEEP
24576:AyLeh/F8K8CUK1a6LVRy/L9dbNa8250YneIolz2O5P7EPmjemZ:HLPKcKlLi9dNo/eBz2O5P4Pmjem
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
f9849d3cef4b3b543463d4ac5a0f1b26c835d3fc3aaf99e4254a3bc8ae6a46a9
-
Size
1.0MB
-
MD5
9c4db766301eefe5e59e78d3b8e9f12e
-
SHA1
056b28c14fe29210e4378486b8949274b9a18a3d
-
SHA256
f9849d3cef4b3b543463d4ac5a0f1b26c835d3fc3aaf99e4254a3bc8ae6a46a9
-
SHA512
f5ae511b56c86f83f79e55733ccf0bc022044c778930b5168a433d0e8be08a48308479ab6b5e6aeceae2c88d755f8abe56a86039682ebb28d289553ea7d8d6fa
-
SSDEEP
24576:AyLeh/F8K8CUK1a6LVRy/L9dbNa8250YneIolz2O5P7EPmjemZ:HLPKcKlLi9dNo/eBz2O5P4Pmjem
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-