General
-
Target
e49393b97dd52e77ec8f22934238e37e257cb18ed0d1365e54d2778dbb00262c
-
Size
1.2MB
-
Sample
230318-jag5kabf32
-
MD5
951bf34ffe97c6b3f26873e8ed31fc06
-
SHA1
15d331f2bd76e139aec540beaeba728079484e77
-
SHA256
e49393b97dd52e77ec8f22934238e37e257cb18ed0d1365e54d2778dbb00262c
-
SHA512
f1c1e01019202bacca65327bd8eb2a81db83007745ba2f654446a4c51ee1b86cea55cd87609c4bb6570733da87632b1cfc123728e018c74ac83bc815fe930b10
-
SSDEEP
24576:v3fA/X9x8NfB7bCvJpAaUQMz5itmXaZH/BV:vISfBnyXAPFQis
Static task
static1
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
e49393b97dd52e77ec8f22934238e37e257cb18ed0d1365e54d2778dbb00262c
-
Size
1.2MB
-
MD5
951bf34ffe97c6b3f26873e8ed31fc06
-
SHA1
15d331f2bd76e139aec540beaeba728079484e77
-
SHA256
e49393b97dd52e77ec8f22934238e37e257cb18ed0d1365e54d2778dbb00262c
-
SHA512
f1c1e01019202bacca65327bd8eb2a81db83007745ba2f654446a4c51ee1b86cea55cd87609c4bb6570733da87632b1cfc123728e018c74ac83bc815fe930b10
-
SSDEEP
24576:v3fA/X9x8NfB7bCvJpAaUQMz5itmXaZH/BV:vISfBnyXAPFQis
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-