General
-
Target
f6de5bd586acab25601fad5c264df3e963ebe1b9fb131f8f2d2ac91cfd004489
-
Size
739KB
-
Sample
230214-ph4anadc38
-
MD5
c48f6e3b0f98af83b565db6bbccf754a
-
SHA1
0bbf3bf88e82476946a8c3e71a9cf4539d368833
-
SHA256
f6de5bd586acab25601fad5c264df3e963ebe1b9fb131f8f2d2ac91cfd004489
-
SHA512
592fa6675d19f0f991148faafdac61b8c6bb4d6044b26d22984f028e2dff8101c64404592564dbe3965b566acd076c6a149b382d4945111ed7ad8042c12487cb
-
SSDEEP
12288:UMrFy90T+ksvVqVJ4yUXjbiD8rj87/Tb9p7f7eeBi62CeLPuqkHl:hyIHsvVpzFE7V57eiiFCEGqkF
Static task
static1
Malware Config
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
cr10
176.113.115.17:4132
-
auth_value
0a52a09c70a98bb6612362e5eb8b1d02
Targets
-
-
Target
f6de5bd586acab25601fad5c264df3e963ebe1b9fb131f8f2d2ac91cfd004489
-
Size
739KB
-
MD5
c48f6e3b0f98af83b565db6bbccf754a
-
SHA1
0bbf3bf88e82476946a8c3e71a9cf4539d368833
-
SHA256
f6de5bd586acab25601fad5c264df3e963ebe1b9fb131f8f2d2ac91cfd004489
-
SHA512
592fa6675d19f0f991148faafdac61b8c6bb4d6044b26d22984f028e2dff8101c64404592564dbe3965b566acd076c6a149b382d4945111ed7ad8042c12487cb
-
SSDEEP
12288:UMrFy90T+ksvVqVJ4yUXjbiD8rj87/Tb9p7f7eeBi62CeLPuqkHl:hyIHsvVpzFE7V57eiiFCEGqkF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-