General
-
Target
81df0c78ad151f8f6e19b5eb526d497cd346c0ed49bf956d961b15201ca29e4d
-
Size
739KB
-
Sample
230302-rlt79sch5z
-
MD5
78d34d353610f14a15be4d96baab6973
-
SHA1
79300447289d431001533decf2faed5b552ee178
-
SHA256
81df0c78ad151f8f6e19b5eb526d497cd346c0ed49bf956d961b15201ca29e4d
-
SHA512
88dd80de24d3ae1f06801e526513b5ca0b853c612bdcbaccbd46c731479902e5899f22d698ee34a5170616e715e5294bfad7d21ef66821d7c8d1f19366d2869d
-
SSDEEP
12288:SMrSy901YVUN2MEUAohFY3I5cFiDtOTgyzkJzGMrvH3NPJNBILWfViWeBX+Z2:0yvVzSAohFFDigosrvH3VB04ViGY
Static task
static1
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Targets
-
-
Target
81df0c78ad151f8f6e19b5eb526d497cd346c0ed49bf956d961b15201ca29e4d
-
Size
739KB
-
MD5
78d34d353610f14a15be4d96baab6973
-
SHA1
79300447289d431001533decf2faed5b552ee178
-
SHA256
81df0c78ad151f8f6e19b5eb526d497cd346c0ed49bf956d961b15201ca29e4d
-
SHA512
88dd80de24d3ae1f06801e526513b5ca0b853c612bdcbaccbd46c731479902e5899f22d698ee34a5170616e715e5294bfad7d21ef66821d7c8d1f19366d2869d
-
SSDEEP
12288:SMrSy901YVUN2MEUAohFY3I5cFiDtOTgyzkJzGMrvH3NPJNBILWfViWeBX+Z2:0yvVzSAohFFDigosrvH3VB04ViGY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-