General
-
Target
462ff89bab4938e3d6fa2d814f2c3e85ec9677f3476bf6a4050a811507e82e1a
-
Size
725KB
-
Sample
230214-fd1jjaab9x
-
MD5
bf33612917562e1df3ec97152aa57f36
-
SHA1
5d1a96df077eff9f38ad2d0504daa7aaec20ea98
-
SHA256
462ff89bab4938e3d6fa2d814f2c3e85ec9677f3476bf6a4050a811507e82e1a
-
SHA512
f0acb31ce527d8eb8a33248d15ffcbec9e157fb41d98a96c10833f5fa67fac3e25a495a2f6d73ee058188b59ccdbc31d169e18a185495b5d424ca5cc635a242d
-
SSDEEP
12288:ZMrty904VLPwyqgckv4ypU4n+JstinFX4/KNJwO1BBPtju+4O3VnF:oytWywkv4mUlJC/KLwWz3
Static task
static1
Behavioral task
behavioral1
Sample
462ff89bab4938e3d6fa2d814f2c3e85ec9677f3476bf6a4050a811507e82e1a.exe
Resource
win10-20220901-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
amadey
3.66
193.233.20.2/Bn89hku/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
462ff89bab4938e3d6fa2d814f2c3e85ec9677f3476bf6a4050a811507e82e1a
-
Size
725KB
-
MD5
bf33612917562e1df3ec97152aa57f36
-
SHA1
5d1a96df077eff9f38ad2d0504daa7aaec20ea98
-
SHA256
462ff89bab4938e3d6fa2d814f2c3e85ec9677f3476bf6a4050a811507e82e1a
-
SHA512
f0acb31ce527d8eb8a33248d15ffcbec9e157fb41d98a96c10833f5fa67fac3e25a495a2f6d73ee058188b59ccdbc31d169e18a185495b5d424ca5cc635a242d
-
SSDEEP
12288:ZMrty904VLPwyqgckv4ypU4n+JstinFX4/KNJwO1BBPtju+4O3VnF:oytWywkv4mUlJC/KLwWz3
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-