General
-
Target
e4c8ad200041b74b5f075f73c5530627b9ad87b2be1dd92ce80c76944d4863a7
-
Size
725KB
-
Sample
230216-geb31aga87
-
MD5
f99632cf59d0b0951ed408040794ce49
-
SHA1
f144aeef2f8df3e4f25c544f8d48923709ea5422
-
SHA256
e4c8ad200041b74b5f075f73c5530627b9ad87b2be1dd92ce80c76944d4863a7
-
SHA512
95c1bd4eda07e7eca84bfff353ff16235707bfa9807a403f2ef19bd086d7fadf16105ee631d8ab3d9d225cae1ce0238ff323f413097168073fcc3139e749279a
-
SSDEEP
12288:cMr8y90A21ffcqNPOljerU+BOSLFRjF/uo5LVTIG5C2A4a1Fq2BMAebzBXtqadN:Yy0Jfcymli3Lnp/vLVTIh4hGerRv
Static task
static1
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Targets
-
-
Target
e4c8ad200041b74b5f075f73c5530627b9ad87b2be1dd92ce80c76944d4863a7
-
Size
725KB
-
MD5
f99632cf59d0b0951ed408040794ce49
-
SHA1
f144aeef2f8df3e4f25c544f8d48923709ea5422
-
SHA256
e4c8ad200041b74b5f075f73c5530627b9ad87b2be1dd92ce80c76944d4863a7
-
SHA512
95c1bd4eda07e7eca84bfff353ff16235707bfa9807a403f2ef19bd086d7fadf16105ee631d8ab3d9d225cae1ce0238ff323f413097168073fcc3139e749279a
-
SSDEEP
12288:cMr8y90A21ffcqNPOljerU+BOSLFRjF/uo5LVTIG5C2A4a1Fq2BMAebzBXtqadN:Yy0Jfcymli3Lnp/vLVTIh4hGerRv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-