General
-
Target
91da5beb7f92e7ed9e92648850b664423181cafebcdd6b9e6bfe3f4c492316bf
-
Size
208KB
-
Sample
220907-fhjftabah4
-
MD5
1f6b1ac9d7a1d43829e949cac203e8c0
-
SHA1
0fa106ccb8d1eedd9f8366b5e1a235023fc756ed
-
SHA256
91da5beb7f92e7ed9e92648850b664423181cafebcdd6b9e6bfe3f4c492316bf
-
SHA512
e826f0898967eb505287da09d1155c2e301972a26dcd31289f21e37dc22f4bc74f161e43f88f0d7a09ae67f81c453f9b0e1baf601a24a3eda13968db7eddbfc2
-
SSDEEP
3072:msKMdHThkeRo50dGpalggegsMoHrbyoBRv4b:yOC0dGpalsgRoSu
Static task
static1
Malware Config
Extracted
redline
747
78.153.144.6:2510
-
auth_value
842e51893ada92572d9bc2e846237976
Extracted
redline
nam5
103.89.90.61:34589
-
auth_value
f23be8e9063fe5d0c6fc3ee8e7d565bd
Targets
-
-
Target
91da5beb7f92e7ed9e92648850b664423181cafebcdd6b9e6bfe3f4c492316bf
-
Size
208KB
-
MD5
1f6b1ac9d7a1d43829e949cac203e8c0
-
SHA1
0fa106ccb8d1eedd9f8366b5e1a235023fc756ed
-
SHA256
91da5beb7f92e7ed9e92648850b664423181cafebcdd6b9e6bfe3f4c492316bf
-
SHA512
e826f0898967eb505287da09d1155c2e301972a26dcd31289f21e37dc22f4bc74f161e43f88f0d7a09ae67f81c453f9b0e1baf601a24a3eda13968db7eddbfc2
-
SSDEEP
3072:msKMdHThkeRo50dGpalggegsMoHrbyoBRv4b:yOC0dGpalsgRoSu
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-