General
-
Target
e84573625544e9c9c244d87b975d60bc71fd5b419ca7477298f16f3d0c507fb8
-
Size
1.3MB
-
Sample
230301-1mkvnaac73
-
MD5
1acd17f22b45250e9ed4c98e21cd4bc5
-
SHA1
ab92d22012a8d143785187e063211f32e8ec6d5c
-
SHA256
e84573625544e9c9c244d87b975d60bc71fd5b419ca7477298f16f3d0c507fb8
-
SHA512
a6b0795b232c992d6c7477cb5f83ac7709038468bb086234bbd6c78adb93e452a9b68e5860444a442d608f34e150dcb5d76d5d032536b0ff5caa617f6bc07de3
-
SSDEEP
24576:dyqffVZlxZ/HoyyfangAy6E2eWKAxfxKm6xNxFjOOD1xvuo69imVwJiDJtNbcx+G:4E3lxZ/HdyigAy6E2eWPpKT3OOXvuX96
Static task
static1
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Targets
-
-
Target
e84573625544e9c9c244d87b975d60bc71fd5b419ca7477298f16f3d0c507fb8
-
Size
1.3MB
-
MD5
1acd17f22b45250e9ed4c98e21cd4bc5
-
SHA1
ab92d22012a8d143785187e063211f32e8ec6d5c
-
SHA256
e84573625544e9c9c244d87b975d60bc71fd5b419ca7477298f16f3d0c507fb8
-
SHA512
a6b0795b232c992d6c7477cb5f83ac7709038468bb086234bbd6c78adb93e452a9b68e5860444a442d608f34e150dcb5d76d5d032536b0ff5caa617f6bc07de3
-
SSDEEP
24576:dyqffVZlxZ/HoyyfangAy6E2eWKAxfxKm6xNxFjOOD1xvuo69imVwJiDJtNbcx+G:4E3lxZ/HdyigAy6E2eWPpKT3OOXvuX96
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-