General
-
Target
file.exe
-
Size
778KB
-
Sample
230210-l3cfwshc8s
-
MD5
acf3f011cffe50e51cab718167ecc4a6
-
SHA1
bcc44acd3f44e22ff6897961779036bc58be0c97
-
SHA256
c821fa7f9d5cd7613eace1b6330f5a92439ae5764b40497c60bf2308ce968708
-
SHA512
be3904c415f032d505b3e3c5556a770be4d8c47e00ab640245a29e9cf0bdd0c5e2177ac330eca02390bfa4176ff0fa9d74f6cd1a82ce0be1f621840f7d0fe2be
-
SSDEEP
12288:mMrJy90mN7+1Y1uWScSTYGNPHGmY/OE3a0GIoj9dPg9RJ3dsngb0ILzzW27RmF:Lyta1CuNzYt2E3QIu+9JsYz7RmF
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
dubna
193.233.20.11:4131
-
auth_value
f324b1269094b7462e56bab025f032f4
Extracted
redline
romka
193.233.20.11:4131
-
auth_value
fcbb3247051f5290e8ac5b1a841af67b
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Targets
-
-
Target
file.exe
-
Size
778KB
-
MD5
acf3f011cffe50e51cab718167ecc4a6
-
SHA1
bcc44acd3f44e22ff6897961779036bc58be0c97
-
SHA256
c821fa7f9d5cd7613eace1b6330f5a92439ae5764b40497c60bf2308ce968708
-
SHA512
be3904c415f032d505b3e3c5556a770be4d8c47e00ab640245a29e9cf0bdd0c5e2177ac330eca02390bfa4176ff0fa9d74f6cd1a82ce0be1f621840f7d0fe2be
-
SSDEEP
12288:mMrJy90mN7+1Y1uWScSTYGNPHGmY/OE3a0GIoj9dPg9RJ3dsngb0ILzzW27RmF:Lyta1CuNzYt2E3QIu+9JsYz7RmF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-