General
-
Target
8669a71f4b3e2c7efade6ad5c50d1b6ac42de52d560a0731909a9f68bbb303d9
-
Size
525KB
-
Sample
230209-nj3vvaae52
-
MD5
d0f97c994f778f5e868004c00dde7585
-
SHA1
42953fe76cd1afd2b14033dd60e25657550bc733
-
SHA256
8669a71f4b3e2c7efade6ad5c50d1b6ac42de52d560a0731909a9f68bbb303d9
-
SHA512
3bc30ccb2ba8de9b6be824cc7cdf5057cc6f9536db0406dc0d13822f947045f2ff7ef0ca08c597aa224051046b6ae9f5336e808d0d54c7858f509b9e9305f937
-
SSDEEP
12288:PMrey90eTOYHh2Qk0v7zmn0uxlSHb9NZg6seF1:tyVTOYHh2Qr7zm0nZjseF1
Static task
static1
Malware Config
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
duma
193.233.20.11:4131
-
auth_value
0f22fcdbad589a61a6c973e449218813
Extracted
redline
romka
193.233.20.11:4131
-
auth_value
fcbb3247051f5290e8ac5b1a841af67b
Extracted
redline
crypt
176.113.115.17:4132
-
auth_value
407e05c9b3a74d99a20f90b091547bd6
Targets
-
-
Target
8669a71f4b3e2c7efade6ad5c50d1b6ac42de52d560a0731909a9f68bbb303d9
-
Size
525KB
-
MD5
d0f97c994f778f5e868004c00dde7585
-
SHA1
42953fe76cd1afd2b14033dd60e25657550bc733
-
SHA256
8669a71f4b3e2c7efade6ad5c50d1b6ac42de52d560a0731909a9f68bbb303d9
-
SHA512
3bc30ccb2ba8de9b6be824cc7cdf5057cc6f9536db0406dc0d13822f947045f2ff7ef0ca08c597aa224051046b6ae9f5336e808d0d54c7858f509b9e9305f937
-
SSDEEP
12288:PMrey90eTOYHh2Qk0v7zmn0uxlSHb9NZg6seF1:tyVTOYHh2Qr7zm0nZjseF1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-