General
-
Target
d9b2b49b1aec0feef6b132067ff23fbd450b5656b9be52b4ff9e86d9e6274022
-
Size
715KB
-
Sample
230212-3crlkagf3z
-
MD5
09269f2773006ad0bd35f0c351c8c8f1
-
SHA1
baaca66289c4be786bb9401a006357242a77601b
-
SHA256
d9b2b49b1aec0feef6b132067ff23fbd450b5656b9be52b4ff9e86d9e6274022
-
SHA512
685449227f08c1e3fb5c2c535b42c99691ad918c3a24c3fe4c94141ef9e63faec87339530016b47e4238f67b8da0f1f94eb43de6e35618f4af8a1231faaa572c
-
SSDEEP
12288:2Mrhy90i6AD3rVOq0HOVAwimURSJVlUueJiciXp58Ckj1R0rIkDqLRG1:fygAD3rQuV9imUAJ/2icq58bSs7Y1
Static task
static1
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
d9b2b49b1aec0feef6b132067ff23fbd450b5656b9be52b4ff9e86d9e6274022
-
Size
715KB
-
MD5
09269f2773006ad0bd35f0c351c8c8f1
-
SHA1
baaca66289c4be786bb9401a006357242a77601b
-
SHA256
d9b2b49b1aec0feef6b132067ff23fbd450b5656b9be52b4ff9e86d9e6274022
-
SHA512
685449227f08c1e3fb5c2c535b42c99691ad918c3a24c3fe4c94141ef9e63faec87339530016b47e4238f67b8da0f1f94eb43de6e35618f4af8a1231faaa572c
-
SSDEEP
12288:2Mrhy90i6AD3rVOq0HOVAwimURSJVlUueJiciXp58Ckj1R0rIkDqLRG1:fygAD3rQuV9imUAJ/2icq58bSs7Y1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-