General
-
Target
f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76
-
Size
1.0MB
-
Sample
230414-jgja7sad6z
-
MD5
aeb573a875ebe645e4523034501c9522
-
SHA1
b1fcf9df6e086d622c9df9cacc88ea29dd88fdbc
-
SHA256
f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76
-
SHA512
46a019b7fd3fe2df6b923518e6f910d1d7468a390395f632ea0c0066761f8803ca9f22ff8325eb8cee8e04174527e71b268c2343503f11f6b09a8836ea62f0f7
-
SSDEEP
24576:WyZzInAhCHA6wKEyLWXc1P9WWUOrfJ9XbQ0gw2Jo:lZzIAhCHAyHaXc1l5UOrXc052
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76
-
Size
1.0MB
-
MD5
aeb573a875ebe645e4523034501c9522
-
SHA1
b1fcf9df6e086d622c9df9cacc88ea29dd88fdbc
-
SHA256
f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76
-
SHA512
46a019b7fd3fe2df6b923518e6f910d1d7468a390395f632ea0c0066761f8803ca9f22ff8325eb8cee8e04174527e71b268c2343503f11f6b09a8836ea62f0f7
-
SSDEEP
24576:WyZzInAhCHA6wKEyLWXc1P9WWUOrfJ9XbQ0gw2Jo:lZzIAhCHAyHaXc1l5UOrXc052
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-