General
-
Target
1f6c2d37d120859bbeedadfeb11d9fbc8ea4698c872e1f5b8c38841f38e455b3
-
Size
1.3MB
-
Sample
230301-hxq6baef91
-
MD5
4dfd1be151ed0ec3749673cc1f76720b
-
SHA1
3cbd3dbc06511ecd5daa0e5ab56a21e6878f2b74
-
SHA256
1f6c2d37d120859bbeedadfeb11d9fbc8ea4698c872e1f5b8c38841f38e455b3
-
SHA512
ce6d55f07796077bfaeda0bca75a2f3ec64bc53aa6b462fbb3e423d63d8b89aa529de268c9ce0083df5b28c4769d887fcd158b6662c6c3271aa6c1da1485b4ac
-
SSDEEP
24576:UyJnd5ttfh2lZ/aB22Dh49z8AgsDVttm2pJyjul8ENrYTE:jJn5tfh6/aQq49cKttv7yj/8
Static task
static1
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
1f6c2d37d120859bbeedadfeb11d9fbc8ea4698c872e1f5b8c38841f38e455b3
-
Size
1.3MB
-
MD5
4dfd1be151ed0ec3749673cc1f76720b
-
SHA1
3cbd3dbc06511ecd5daa0e5ab56a21e6878f2b74
-
SHA256
1f6c2d37d120859bbeedadfeb11d9fbc8ea4698c872e1f5b8c38841f38e455b3
-
SHA512
ce6d55f07796077bfaeda0bca75a2f3ec64bc53aa6b462fbb3e423d63d8b89aa529de268c9ce0083df5b28c4769d887fcd158b6662c6c3271aa6c1da1485b4ac
-
SSDEEP
24576:UyJnd5ttfh2lZ/aB22Dh49z8AgsDVttm2pJyjul8ENrYTE:jJn5tfh6/aQq49cKttv7yj/8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-