General
-
Target
5a26fcfe80b13039bdf5f70800f484a069fe650824182ba1b5e1032c5c6f6cd0
-
Size
779KB
-
Sample
230210-kw669aee98
-
MD5
141218db67fa6bb68b1da015ed03a04e
-
SHA1
97252980c68d682067171b268693f29446319a7d
-
SHA256
5a26fcfe80b13039bdf5f70800f484a069fe650824182ba1b5e1032c5c6f6cd0
-
SHA512
0c7a8338bb18842faa798f38d8e1ec73a1affac7a12dbd6e37e9feea8fad18126cca2b082fa531b71db2053845ce72c1328a5c5d52b0072000e89be696e7b9f3
-
SSDEEP
12288:/Mruy90FZJoN7oednxoUHBJeEfzHHyq6qmn2TnageJlAobl+TQQ:1ySoJoedT+Ebnyq6Hn2bag2jbITV
Static task
static1
Malware Config
Extracted
redline
dubna
193.233.20.11:4131
-
auth_value
f324b1269094b7462e56bab025f032f4
Extracted
redline
romka
193.233.20.11:4131
-
auth_value
fcbb3247051f5290e8ac5b1a841af67b
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Targets
-
-
Target
5a26fcfe80b13039bdf5f70800f484a069fe650824182ba1b5e1032c5c6f6cd0
-
Size
779KB
-
MD5
141218db67fa6bb68b1da015ed03a04e
-
SHA1
97252980c68d682067171b268693f29446319a7d
-
SHA256
5a26fcfe80b13039bdf5f70800f484a069fe650824182ba1b5e1032c5c6f6cd0
-
SHA512
0c7a8338bb18842faa798f38d8e1ec73a1affac7a12dbd6e37e9feea8fad18126cca2b082fa531b71db2053845ce72c1328a5c5d52b0072000e89be696e7b9f3
-
SSDEEP
12288:/Mruy90FZJoN7oednxoUHBJeEfzHHyq6qmn2TnageJlAobl+TQQ:1ySoJoedT+Ebnyq6Hn2bag2jbITV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-