General
-
Target
33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4
-
Size
993KB
-
Sample
230216-pxewlshe73
-
MD5
b6f653647fd899da126d0b926630bcb9
-
SHA1
56e8963a7b18adbc09ef827779336c440b0e2dc8
-
SHA256
33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4
-
SHA512
d7ad348d8cb4dd205a9e8b0fcb5dc0a03f04ee9a49f3dc5ebd838c05a84eaaf58f3706c497bf05b929426c0ca7baad9730317620a1070ab507cff71da11410d9
-
SSDEEP
12288:WMr1y90PikXhsFUfXPSy5ykkcDPvav3kSu/sU6cQGM2/8UK7EK8X1FC4eO:7yQXhsF09KESuUVPtVUlbXP
Static task
static1
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
redline
nock
176.113.115.17:4132
-
auth_value
f32d3c6ff0a9a7632c60a2b045a9cde6
Targets
-
-
Target
33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4
-
Size
993KB
-
MD5
b6f653647fd899da126d0b926630bcb9
-
SHA1
56e8963a7b18adbc09ef827779336c440b0e2dc8
-
SHA256
33981ad41e62cef07328007db97a7db9f42c3e4b58e717bfbbff64c7e435e8c4
-
SHA512
d7ad348d8cb4dd205a9e8b0fcb5dc0a03f04ee9a49f3dc5ebd838c05a84eaaf58f3706c497bf05b929426c0ca7baad9730317620a1070ab507cff71da11410d9
-
SSDEEP
12288:WMr1y90PikXhsFUfXPSy5ykkcDPvav3kSu/sU6cQGM2/8UK7EK8X1FC4eO:7yQXhsF09KESuUVPtVUlbXP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-