General
-
Target
f1370c7e46f29bfa38fd58aeb1cb886a7b5c2850994fb04e0dc1146661a8c9d6
-
Size
714KB
-
Sample
230214-nzkn7sce2w
-
MD5
f68395f4e68f81691be769b576e844f3
-
SHA1
dcc1126529bd4682b29346508c78f386da38b4ad
-
SHA256
f1370c7e46f29bfa38fd58aeb1cb886a7b5c2850994fb04e0dc1146661a8c9d6
-
SHA512
b2941d33fa28d8b6bb82eed34c53808ea3ca9d3d4b50f2d273042ed6e222a18bfbf73dc73d8aee4aeb44562cf2d3a4f17b479e172bd8cbe7da4f458b9cfa92f7
-
SSDEEP
12288:bMr+y909Pn0VKorgVO3c5kTgKzvB7YojJxRUHMD5zjV5gzP2IjVq1vXMvDc11/pB:Jyu0VKosVOM5kF77xjDZjVezPtjVgcv6
Static task
static1
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
62.204.41.88/9vdVVVjsw/index.php
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Targets
-
-
Target
f1370c7e46f29bfa38fd58aeb1cb886a7b5c2850994fb04e0dc1146661a8c9d6
-
Size
714KB
-
MD5
f68395f4e68f81691be769b576e844f3
-
SHA1
dcc1126529bd4682b29346508c78f386da38b4ad
-
SHA256
f1370c7e46f29bfa38fd58aeb1cb886a7b5c2850994fb04e0dc1146661a8c9d6
-
SHA512
b2941d33fa28d8b6bb82eed34c53808ea3ca9d3d4b50f2d273042ed6e222a18bfbf73dc73d8aee4aeb44562cf2d3a4f17b479e172bd8cbe7da4f458b9cfa92f7
-
SSDEEP
12288:bMr+y909Pn0VKorgVO3c5kTgKzvB7YojJxRUHMD5zjV5gzP2IjVq1vXMvDc11/pB:Jyu0VKosVOM5kF77xjDZjVezPtjVgcv6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-