General
-
Target
ada7de5f3534bbc068ef4c1a8e133f4aa047ffe43d53808287d165d96e4c133b
-
Size
988KB
-
Sample
230303-zy6qtsah5x
-
MD5
35d2ec3aad363a5007b5c329a7aaab05
-
SHA1
2ca19b9f352ebe00c2a6a562d5a00a3cda77704c
-
SHA256
ada7de5f3534bbc068ef4c1a8e133f4aa047ffe43d53808287d165d96e4c133b
-
SHA512
8348d9ba13e1854dca5be00bc588116cb0d5801dc19abb0d1be2e3e20827ec6c9569a9e867ee75c79ed5fb65bcf1cbaffd3e797f995bbfd49edbfe1e01a939bc
-
SSDEEP
24576:ay6xlnzRbpnJAb9e5+2Dq41f8GyHMtpeUk5A9zy6ZMp:h6x9ZA5K3DBfJtYUiEzy
Static task
static1
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
ada7de5f3534bbc068ef4c1a8e133f4aa047ffe43d53808287d165d96e4c133b
-
Size
988KB
-
MD5
35d2ec3aad363a5007b5c329a7aaab05
-
SHA1
2ca19b9f352ebe00c2a6a562d5a00a3cda77704c
-
SHA256
ada7de5f3534bbc068ef4c1a8e133f4aa047ffe43d53808287d165d96e4c133b
-
SHA512
8348d9ba13e1854dca5be00bc588116cb0d5801dc19abb0d1be2e3e20827ec6c9569a9e867ee75c79ed5fb65bcf1cbaffd3e797f995bbfd49edbfe1e01a939bc
-
SSDEEP
24576:ay6xlnzRbpnJAb9e5+2Dq41f8GyHMtpeUk5A9zy6ZMp:h6x9ZA5K3DBfJtYUiEzy
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-