General
-
Target
08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae
-
Size
1.2MB
-
Sample
230414-j2selsae51
-
MD5
a589de6485aa1f78a1eb20df98e6c59e
-
SHA1
29e824f4015273fe87e26da711a5d3c289a6bf69
-
SHA256
08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae
-
SHA512
500bde4c74705ed908b47c828ebe4624e2c3b9ac1bc61db34dc8c3f8831ea34b89bc079cad75af1685e284a68bbbbe00db61c36860dc585304923f8e276d2805
-
SSDEEP
24576:FykcpAhtyJ5zKV7Hbi1O9NH6sdMCOdeOs5HDC2ft:gVpatyzzKV7Hbi1i54dSHD
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae
-
Size
1.2MB
-
MD5
a589de6485aa1f78a1eb20df98e6c59e
-
SHA1
29e824f4015273fe87e26da711a5d3c289a6bf69
-
SHA256
08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae
-
SHA512
500bde4c74705ed908b47c828ebe4624e2c3b9ac1bc61db34dc8c3f8831ea34b89bc079cad75af1685e284a68bbbbe00db61c36860dc585304923f8e276d2805
-
SSDEEP
24576:FykcpAhtyJ5zKV7Hbi1O9NH6sdMCOdeOs5HDC2ft:gVpatyzzKV7Hbi1i54dSHD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-