General
-
Target
Solara.exe
-
Size
310KB
-
Sample
240927-p81mfswdle
-
MD5
6955182e32d6996b84f140c7032443df
-
SHA1
4b0850e389a6f1f51d4c0e9d6c4e9e2b2f92f006
-
SHA256
ff7db4abfc2600f13a47255db00fd1b450623c41ba30846c57b86b61b4e98c14
-
SHA512
984171890a252aea437f86a1068de2f3c04a4611ad658d28e7cba57d8bcb5180765c897d25606adcc3217ab722de28be68b5895b0308e892030d2d86bc2394ea
-
SSDEEP
6144:IWdi58lWsw859s5iANWfUfGr4X3ohglhFexKc6:riClUUaiArfX3oh4x
Static task
static1
Behavioral task
behavioral1
Sample
Solara.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Solara.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
redline
185.196.9.26:6302
Targets
-
-
Target
Solara.exe
-
Size
310KB
-
MD5
6955182e32d6996b84f140c7032443df
-
SHA1
4b0850e389a6f1f51d4c0e9d6c4e9e2b2f92f006
-
SHA256
ff7db4abfc2600f13a47255db00fd1b450623c41ba30846c57b86b61b4e98c14
-
SHA512
984171890a252aea437f86a1068de2f3c04a4611ad658d28e7cba57d8bcb5180765c897d25606adcc3217ab722de28be68b5895b0308e892030d2d86bc2394ea
-
SSDEEP
6144:IWdi58lWsw859s5iANWfUfGr4X3ohglhFexKc6:riClUUaiArfX3oh4x
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-