General
-
Target
e22c5184f3a15a3c68445bd9ce2cee216f062e33f957eba88230e3fd46fd9d3a
-
Size
719KB
-
Sample
230212-lebvfscc46
-
MD5
a98b1727697769531913188ee94d4090
-
SHA1
d1719c297eca9672edfa4981a99674a60604f0a3
-
SHA256
e22c5184f3a15a3c68445bd9ce2cee216f062e33f957eba88230e3fd46fd9d3a
-
SHA512
061108572565e687d6695f85a893d2219e818e49c95048d1197b8156ecdacd27a624a9bc4a276c64a80e0d912ac2e1e06330effcf27cddeee07ba52b758e87b0
-
SSDEEP
12288:yMriy90rrBA76u7j5J7ZKwkFtuO88l6+IPxDbPunE8G0PIuzhClDl8ddMT:QyZL7jT7ZX6R88l6+IpfmnE8GczMlpM
Static task
static1
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
e22c5184f3a15a3c68445bd9ce2cee216f062e33f957eba88230e3fd46fd9d3a
-
Size
719KB
-
MD5
a98b1727697769531913188ee94d4090
-
SHA1
d1719c297eca9672edfa4981a99674a60604f0a3
-
SHA256
e22c5184f3a15a3c68445bd9ce2cee216f062e33f957eba88230e3fd46fd9d3a
-
SHA512
061108572565e687d6695f85a893d2219e818e49c95048d1197b8156ecdacd27a624a9bc4a276c64a80e0d912ac2e1e06330effcf27cddeee07ba52b758e87b0
-
SSDEEP
12288:yMriy90rrBA76u7j5J7ZKwkFtuO88l6+IPxDbPunE8G0PIuzhClDl8ddMT:QyZL7jT7ZX6R88l6+IpfmnE8GczMlpM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-