General
-
Target
33eddd79d3f2bec1bb68c0ff890b6bdc35803243e46058309ab6d0e44062249d
-
Size
1.2MB
-
Sample
230318-jwdz2abf59
-
MD5
c3aa48ac24dc2589c475b9300cadd313
-
SHA1
447b9482cefa801e976193fd380e240ec043b0f3
-
SHA256
33eddd79d3f2bec1bb68c0ff890b6bdc35803243e46058309ab6d0e44062249d
-
SHA512
9a5f9375dfa65609fbcaf5331911d4bf93c92087f02c640aa6ab2be588396df53297e14e545be902cb5d82d4736bfd337349458e56700bdc116ee3547f9db0d1
-
SSDEEP
24576:03fA/X9x8NfB7bCvJpAaUQMz5itmXaZH/BV:0ISfBnyXAPFQis
Static task
static1
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
33eddd79d3f2bec1bb68c0ff890b6bdc35803243e46058309ab6d0e44062249d
-
Size
1.2MB
-
MD5
c3aa48ac24dc2589c475b9300cadd313
-
SHA1
447b9482cefa801e976193fd380e240ec043b0f3
-
SHA256
33eddd79d3f2bec1bb68c0ff890b6bdc35803243e46058309ab6d0e44062249d
-
SHA512
9a5f9375dfa65609fbcaf5331911d4bf93c92087f02c640aa6ab2be588396df53297e14e545be902cb5d82d4736bfd337349458e56700bdc116ee3547f9db0d1
-
SSDEEP
24576:03fA/X9x8NfB7bCvJpAaUQMz5itmXaZH/BV:0ISfBnyXAPFQis
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-