General
-
Target
a4ef460c6529e89131a309c44b3d0daa848b8dac2cc838c037b4de927ad0e312
-
Size
1.2MB
-
Sample
230414-kkhphsaf4x
-
MD5
687b5a7e261bf486a88fa06d56088e8b
-
SHA1
baa5c8b4f68ed5d44547331696af36efec4b8244
-
SHA256
a4ef460c6529e89131a309c44b3d0daa848b8dac2cc838c037b4de927ad0e312
-
SHA512
e527953e59e0c596473ed412554d0205dc63fad8959785e171209a059a0a69704641012627354cadbd36692a72de59a50a02dfb75eb7b8cb609412dc5b47cefb
-
SSDEEP
24576:nyPegMCSnMIZZ5vzOqM1T9Nww6I+3ht3nCcufP:yPjMCSnMI7vSqM1xmw6Rt3CPf
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
a4ef460c6529e89131a309c44b3d0daa848b8dac2cc838c037b4de927ad0e312
-
Size
1.2MB
-
MD5
687b5a7e261bf486a88fa06d56088e8b
-
SHA1
baa5c8b4f68ed5d44547331696af36efec4b8244
-
SHA256
a4ef460c6529e89131a309c44b3d0daa848b8dac2cc838c037b4de927ad0e312
-
SHA512
e527953e59e0c596473ed412554d0205dc63fad8959785e171209a059a0a69704641012627354cadbd36692a72de59a50a02dfb75eb7b8cb609412dc5b47cefb
-
SSDEEP
24576:nyPegMCSnMIZZ5vzOqM1T9Nww6I+3ht3nCcufP:yPjMCSnMI7vSqM1xmw6Rt3CPf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-