General
-
Target
a4c8835b5e8d760d335d4454d7c2483ecbcb89512d304af6865976cc05a43612
-
Size
2.1MB
-
Sample
230210-kav7vsch25
-
MD5
9a9806187e61f000ff9aaff8f177a4f7
-
SHA1
0dd78f17503d0c4942a39162ca781c9a76d702b4
-
SHA256
a4c8835b5e8d760d335d4454d7c2483ecbcb89512d304af6865976cc05a43612
-
SHA512
a887fd15db05b0ba4c42bfcb15f00937aa1ec87369e9c5c6ed0d099674dc93d1a0477222f9c7225c1ef0b3d7addcd3707eb0339b90147408108b3413c8845759
-
SSDEEP
49152:/0jPZDnyL6A3QCtO8dsCqYlQxIoz2I7ulWqLas:8xk6AgF8mbYq2dICN
Static task
static1
Malware Config
Extracted
redline
fuka
193.233.20.11:4131
-
auth_value
90eef520554ef188793d77ecc34217bf
Extracted
redline
romka
193.233.20.11:4131
-
auth_value
fcbb3247051f5290e8ac5b1a841af67b
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Targets
-
-
Target
a4c8835b5e8d760d335d4454d7c2483ecbcb89512d304af6865976cc05a43612
-
Size
2.1MB
-
MD5
9a9806187e61f000ff9aaff8f177a4f7
-
SHA1
0dd78f17503d0c4942a39162ca781c9a76d702b4
-
SHA256
a4c8835b5e8d760d335d4454d7c2483ecbcb89512d304af6865976cc05a43612
-
SHA512
a887fd15db05b0ba4c42bfcb15f00937aa1ec87369e9c5c6ed0d099674dc93d1a0477222f9c7225c1ef0b3d7addcd3707eb0339b90147408108b3413c8845759
-
SSDEEP
49152:/0jPZDnyL6A3QCtO8dsCqYlQxIoz2I7ulWqLas:8xk6AgF8mbYq2dICN
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-