General
-
Target
58f43329a5b00c2cb60f8d9c993f6ae7460a9da06c6f3c586735d9ed3d6495c4
-
Size
739KB
-
Sample
230211-qjkelsdc2y
-
MD5
5ace0280d4aa29375571cd9caa1105bc
-
SHA1
310f8c9096ba73d995553399089d743d6ec9ddf9
-
SHA256
58f43329a5b00c2cb60f8d9c993f6ae7460a9da06c6f3c586735d9ed3d6495c4
-
SHA512
59f265faf062d1428ae1444c33587db186d027d57d5975e6a0eeb5eef854609f38d7f250b103ebb7a9dcb126f6212ac24ace7472c9d6d6e4a610200c29bfcbc0
-
SSDEEP
12288:zMrCy90c0B1bCI2Qrgcf5sPWsftuJ7vVeJFd0f20Uvs2:tyfG1uwVCPzfBFufrus2
Static task
static1
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
58f43329a5b00c2cb60f8d9c993f6ae7460a9da06c6f3c586735d9ed3d6495c4
-
Size
739KB
-
MD5
5ace0280d4aa29375571cd9caa1105bc
-
SHA1
310f8c9096ba73d995553399089d743d6ec9ddf9
-
SHA256
58f43329a5b00c2cb60f8d9c993f6ae7460a9da06c6f3c586735d9ed3d6495c4
-
SHA512
59f265faf062d1428ae1444c33587db186d027d57d5975e6a0eeb5eef854609f38d7f250b103ebb7a9dcb126f6212ac24ace7472c9d6d6e4a610200c29bfcbc0
-
SSDEEP
12288:zMrCy90c0B1bCI2Qrgcf5sPWsftuJ7vVeJFd0f20Uvs2:tyfG1uwVCPzfBFufrus2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-