General
-
Target
fa8d714ca215a27acddc46250299a89b13271630e1c9355e3687edf14c82e290
-
Size
714KB
-
Sample
230214-q74s6adc2x
-
MD5
87a7c4ae9698916bab3ae2d8bb1f8366
-
SHA1
728e1f2119d09613ed928b1fe827a13deb8ff82a
-
SHA256
fa8d714ca215a27acddc46250299a89b13271630e1c9355e3687edf14c82e290
-
SHA512
fb8d23d771863a5d6ea3ed4af5de3dd1534063e0b07b21a7acfae9d96d27edd6f1464b83d8a5ca159ad0047083149a18a19f10499c78c991b68c6cb0e9713415
-
SSDEEP
12288:9MrVy90TSs1qHI1bceWKzr3awXMD5SNx5pyAPWAQJa2GTr2fko:wyRQbcez1cDkNxVzQEr2fj
Static task
static1
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Targets
-
-
Target
fa8d714ca215a27acddc46250299a89b13271630e1c9355e3687edf14c82e290
-
Size
714KB
-
MD5
87a7c4ae9698916bab3ae2d8bb1f8366
-
SHA1
728e1f2119d09613ed928b1fe827a13deb8ff82a
-
SHA256
fa8d714ca215a27acddc46250299a89b13271630e1c9355e3687edf14c82e290
-
SHA512
fb8d23d771863a5d6ea3ed4af5de3dd1534063e0b07b21a7acfae9d96d27edd6f1464b83d8a5ca159ad0047083149a18a19f10499c78c991b68c6cb0e9713415
-
SSDEEP
12288:9MrVy90TSs1qHI1bceWKzr3awXMD5SNx5pyAPWAQJa2GTr2fko:wyRQbcez1cDkNxVzQEr2fj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-