General
-
Target
d41e270a734d0022a1ac52d8dd998614e54817d0f123f4b9ecc14db6ed135c8f
-
Size
1.2MB
-
Sample
230317-z9fnsacb2s
-
MD5
9f029b032699605186beaa3b11f2adeb
-
SHA1
64a23c4397c2a4de7b9c29b8eb8ad0052ed9956c
-
SHA256
d41e270a734d0022a1ac52d8dd998614e54817d0f123f4b9ecc14db6ed135c8f
-
SHA512
0f404a2f4e33c40996d7ef6d3ac05c90077c184c82dc46ca577fd0ec9443c1682671c1a756573808bb144432f343b75493731be4a7f7cb1fc7e2fcbbc3042c51
-
SSDEEP
24576:qgcL02I4/sr0X8KvEjUS3/XxExcPXxp2eCEpH:qgcL02Ix2SPX2+PX8
Static task
static1
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
d41e270a734d0022a1ac52d8dd998614e54817d0f123f4b9ecc14db6ed135c8f
-
Size
1.2MB
-
MD5
9f029b032699605186beaa3b11f2adeb
-
SHA1
64a23c4397c2a4de7b9c29b8eb8ad0052ed9956c
-
SHA256
d41e270a734d0022a1ac52d8dd998614e54817d0f123f4b9ecc14db6ed135c8f
-
SHA512
0f404a2f4e33c40996d7ef6d3ac05c90077c184c82dc46ca577fd0ec9443c1682671c1a756573808bb144432f343b75493731be4a7f7cb1fc7e2fcbbc3042c51
-
SSDEEP
24576:qgcL02I4/sr0X8KvEjUS3/XxExcPXxp2eCEpH:qgcL02Ix2SPX2+PX8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-