General
-
Target
f8ac981ac8d88546ccf7d2b80abcfafe376cb7e1c4a6d7b750ae98e788aa47b6
-
Size
740KB
-
Sample
230211-vybhgadc92
-
MD5
1b3a009fc9cc253b29776c9c74af1d2b
-
SHA1
97e3b591c0ea340502a95687935bf49516143187
-
SHA256
f8ac981ac8d88546ccf7d2b80abcfafe376cb7e1c4a6d7b750ae98e788aa47b6
-
SHA512
a0832225afe01b223d7e7e979a1f047c5e3a5c6d3bdad5d282ca21f8040207851d878f3a115755a7afbec93496458fe53eb1bdf6e8ae3889756abd7b7312c521
-
SSDEEP
12288:cMrjy90FbJxjPEm8DGbhT1kaeJKMq+HqWnH6d33rcqrqht2XF:vyEJxjPEm8DGBuKMXKWH6VPBXF
Static task
static1
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
f8ac981ac8d88546ccf7d2b80abcfafe376cb7e1c4a6d7b750ae98e788aa47b6
-
Size
740KB
-
MD5
1b3a009fc9cc253b29776c9c74af1d2b
-
SHA1
97e3b591c0ea340502a95687935bf49516143187
-
SHA256
f8ac981ac8d88546ccf7d2b80abcfafe376cb7e1c4a6d7b750ae98e788aa47b6
-
SHA512
a0832225afe01b223d7e7e979a1f047c5e3a5c6d3bdad5d282ca21f8040207851d878f3a115755a7afbec93496458fe53eb1bdf6e8ae3889756abd7b7312c521
-
SSDEEP
12288:cMrjy90FbJxjPEm8DGbhT1kaeJKMq+HqWnH6d33rcqrqht2XF:vyEJxjPEm8DGBuKMXKWH6VPBXF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-