General
-
Target
96a44b8738eed65b9fb1b4f97d76262f745ff14e146b3328be264001f6b3fd02
-
Size
725KB
-
Sample
230215-g2xm8aae48
-
MD5
ce6a652dc995bc2b98bacad9c1340091
-
SHA1
de529dc699bc35a281b00e4404cb2335eab415e2
-
SHA256
96a44b8738eed65b9fb1b4f97d76262f745ff14e146b3328be264001f6b3fd02
-
SHA512
5adafb232363e0d7b43f092e2fc432e289baa80f7bb85ed8b06e7f860eb65b4afde11b3850a775d98f7a533294d61c99e414581832ffe9c179a5dc1a1cc30203
-
SSDEEP
12288:uMrsy90FgLFK+BIYeL5qdEHSNP3vj2M6fmp9qtL28sUK33HThpVRVRl:my/ZK+Bjed3ytMmCc9UaXbV/Rl
Static task
static1
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Targets
-
-
Target
96a44b8738eed65b9fb1b4f97d76262f745ff14e146b3328be264001f6b3fd02
-
Size
725KB
-
MD5
ce6a652dc995bc2b98bacad9c1340091
-
SHA1
de529dc699bc35a281b00e4404cb2335eab415e2
-
SHA256
96a44b8738eed65b9fb1b4f97d76262f745ff14e146b3328be264001f6b3fd02
-
SHA512
5adafb232363e0d7b43f092e2fc432e289baa80f7bb85ed8b06e7f860eb65b4afde11b3850a775d98f7a533294d61c99e414581832ffe9c179a5dc1a1cc30203
-
SSDEEP
12288:uMrsy90FgLFK+BIYeL5qdEHSNP3vj2M6fmp9qtL28sUK33HThpVRVRl:my/ZK+Bjed3ytMmCc9UaXbV/Rl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-