General
-
Target
3bedf60c81971f06c43fdf4e67654c0fdc968a1c07df7175ce7e10eb5c1e5518
-
Size
786KB
-
Sample
230210-q9mmnabh7t
-
MD5
63488ac3d0c63d5a5b1cef8d2c0811ea
-
SHA1
f908ee709a2a2d654f516dfd71224035dcb83a50
-
SHA256
3bedf60c81971f06c43fdf4e67654c0fdc968a1c07df7175ce7e10eb5c1e5518
-
SHA512
63000e708ec5ac036542f19a79562401300e7537de1001435eb4c36386ad7069fd603b2db3826399f694c8038175320e91380562ae774d1a7f1c0e901b83245a
-
SSDEEP
12288:LMrwy90SWR2NL9Y4/GWtG3ShODgtUG3eu58Snp3UTWQZ2AZRG4EVH1RT:vyjWkN9Y4OHSUUlOuau3IA7Zj
Static task
static1
Malware Config
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
dubna
193.233.20.11:4131
-
auth_value
f324b1269094b7462e56bab025f032f4
Extracted
redline
romka
193.233.20.11:4131
-
auth_value
fcbb3247051f5290e8ac5b1a841af67b
Targets
-
-
Target
3bedf60c81971f06c43fdf4e67654c0fdc968a1c07df7175ce7e10eb5c1e5518
-
Size
786KB
-
MD5
63488ac3d0c63d5a5b1cef8d2c0811ea
-
SHA1
f908ee709a2a2d654f516dfd71224035dcb83a50
-
SHA256
3bedf60c81971f06c43fdf4e67654c0fdc968a1c07df7175ce7e10eb5c1e5518
-
SHA512
63000e708ec5ac036542f19a79562401300e7537de1001435eb4c36386ad7069fd603b2db3826399f694c8038175320e91380562ae774d1a7f1c0e901b83245a
-
SSDEEP
12288:LMrwy90SWR2NL9Y4/GWtG3ShODgtUG3eu58Snp3UTWQZ2AZRG4EVH1RT:vyjWkN9Y4OHSUUlOuau3IA7Zj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-