General
-
Target
696a5e921b5686dcae5a59b718776dc7018602bc4004d360a7a22da55252d91d
-
Size
1.2MB
-
Sample
230317-w3ew5ahe49
-
MD5
b3a9bed5c531a5a55983413407e71712
-
SHA1
652c0df1988092687d8219b9247b140e1e3eb784
-
SHA256
696a5e921b5686dcae5a59b718776dc7018602bc4004d360a7a22da55252d91d
-
SHA512
3506aa598e7a52dd8be259a21e01e53431dd0d9f09d77f8424672a2357e2f839ec00c2dd2e85eb55aae42bd056d9ff2e4b6d67b89159b06fb74872fe264c48aa
-
SSDEEP
24576:OkcpCh/hx1VCKnXPGgP88lsB3UAQy2HrABIaJWQj+mFDT55+HnnL3H:OkcpCh71lPkB3UAZ2HUr4QjPRT54H
Static task
static1
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
696a5e921b5686dcae5a59b718776dc7018602bc4004d360a7a22da55252d91d
-
Size
1.2MB
-
MD5
b3a9bed5c531a5a55983413407e71712
-
SHA1
652c0df1988092687d8219b9247b140e1e3eb784
-
SHA256
696a5e921b5686dcae5a59b718776dc7018602bc4004d360a7a22da55252d91d
-
SHA512
3506aa598e7a52dd8be259a21e01e53431dd0d9f09d77f8424672a2357e2f839ec00c2dd2e85eb55aae42bd056d9ff2e4b6d67b89159b06fb74872fe264c48aa
-
SSDEEP
24576:OkcpCh/hx1VCKnXPGgP88lsB3UAQy2HrABIaJWQj+mFDT55+HnnL3H:OkcpCh71lPkB3UAZ2HUr4QjPRT54H
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-