General
-
Target
d6b66a0ef20a3ea2313ca754bcde7f45efd6f0973a5fbbe43f4b78fd33030c98
-
Size
766KB
-
Sample
230211-1wjzqabg85
-
MD5
9620935a01767336e1f97960462bd168
-
SHA1
97d9930b7bd78a474603085efccad4ce48610d08
-
SHA256
d6b66a0ef20a3ea2313ca754bcde7f45efd6f0973a5fbbe43f4b78fd33030c98
-
SHA512
46a261985443faa3c95c16899b88e7c5970f2e35bf757bdc3e64e095bd8afe3834b6757cb4038d987548a0d7b08d44b797653e13eb5188fe2174c469c86b50dc
-
SSDEEP
12288:XMr8y90RHMeBgUaAMlP5cZEN66fbADnYSmK0qutFM8IlQqby1HssSeOvQG2:nygM4gAMPMTYK0qutY67Fspews
Static task
static1
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Targets
-
-
Target
d6b66a0ef20a3ea2313ca754bcde7f45efd6f0973a5fbbe43f4b78fd33030c98
-
Size
766KB
-
MD5
9620935a01767336e1f97960462bd168
-
SHA1
97d9930b7bd78a474603085efccad4ce48610d08
-
SHA256
d6b66a0ef20a3ea2313ca754bcde7f45efd6f0973a5fbbe43f4b78fd33030c98
-
SHA512
46a261985443faa3c95c16899b88e7c5970f2e35bf757bdc3e64e095bd8afe3834b6757cb4038d987548a0d7b08d44b797653e13eb5188fe2174c469c86b50dc
-
SSDEEP
12288:XMr8y90RHMeBgUaAMlP5cZEN66fbADnYSmK0qutFM8IlQqby1HssSeOvQG2:nygM4gAMPMTYK0qutY67Fspews
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-