General
-
Target
31323bd2ae61c40a1b7dfc9d65c54b08af21663b77c5edbd534c63949f768f37
-
Size
796KB
-
Sample
230211-clnm6adc43
-
MD5
ded7456a22feaddcabbb09ba0d006914
-
SHA1
861b10e65e99ae9872144d59c59341c2c482a7a9
-
SHA256
31323bd2ae61c40a1b7dfc9d65c54b08af21663b77c5edbd534c63949f768f37
-
SHA512
3f7ac062c2b7ad52fdcaa66dde7e3b3e26f68feadf933fe78c5cc7b7faf54d4393d087cae4d3c1fa37a9dea375b61e6f738a51f28d6a4b33594838dc827b6de6
-
SSDEEP
12288:vMrSy90r1r206oFzBgJzxg19dnw8eJ1gs3+Qis620PVeNFqfLIbEyrAyYq/j:hyIBl6KizQo1l34vALqfLItrXpj
Static task
static1
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
31323bd2ae61c40a1b7dfc9d65c54b08af21663b77c5edbd534c63949f768f37
-
Size
796KB
-
MD5
ded7456a22feaddcabbb09ba0d006914
-
SHA1
861b10e65e99ae9872144d59c59341c2c482a7a9
-
SHA256
31323bd2ae61c40a1b7dfc9d65c54b08af21663b77c5edbd534c63949f768f37
-
SHA512
3f7ac062c2b7ad52fdcaa66dde7e3b3e26f68feadf933fe78c5cc7b7faf54d4393d087cae4d3c1fa37a9dea375b61e6f738a51f28d6a4b33594838dc827b6de6
-
SSDEEP
12288:vMrSy90r1r206oFzBgJzxg19dnw8eJ1gs3+Qis620PVeNFqfLIbEyrAyYq/j:hyIBl6KizQo1l34vALqfLItrXpj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-