General
-
Target
6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002
-
Size
1.4MB
-
Sample
230301-anjqwadd3w
-
MD5
7a2e71a96335b24792985c095814e06d
-
SHA1
0707752e093590bbd192649146a892e008179f0a
-
SHA256
6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002
-
SHA512
297b236c952ea757778f2fcecd32d7068717a198f2fc67ac01676b22a6e84ce0b77b594c2df57c9247f50306a6b3bfad7d211b41b92f8fea19885155c7a14eb2
-
SSDEEP
24576:Xyo8pt7JVCtkdW7GaTWk1Ej9HY2bVumErU2k46HSzPI3T3B:io8pVup71T3wHXb9y5JzPw
Static task
static1
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002
-
Size
1.4MB
-
MD5
7a2e71a96335b24792985c095814e06d
-
SHA1
0707752e093590bbd192649146a892e008179f0a
-
SHA256
6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002
-
SHA512
297b236c952ea757778f2fcecd32d7068717a198f2fc67ac01676b22a6e84ce0b77b594c2df57c9247f50306a6b3bfad7d211b41b92f8fea19885155c7a14eb2
-
SSDEEP
24576:Xyo8pt7JVCtkdW7GaTWk1Ej9HY2bVumErU2k46HSzPI3T3B:io8pVup71T3wHXb9y5JzPw
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-