General
-
Target
3d1a66bdce54970b321204708c962c89a9439755038c95f3e15ebec107b3f9f4
-
Size
1.2MB
-
Sample
230318-snnnyaeg4v
-
MD5
5e6e24cf7cb4d8a015049e6191007af4
-
SHA1
1a1318ba2433b6e224b8ee0301c4436f971fcbc2
-
SHA256
3d1a66bdce54970b321204708c962c89a9439755038c95f3e15ebec107b3f9f4
-
SHA512
8a5a41de4c3e2d1a5ded8d8d12ddfa86c2f7e513186e0a83b43443e0c7a3a3247f5080091fbe99dde2e6f945e7d8597c89ad08dbd1ce2842d50cb54f792a14f7
-
SSDEEP
24576:/ogX4PvpDseL3ckNcZQrKxl3fXZ16b4PEPtYn1h7Xn6iZGyF:/doPLrcepKfBG4PEED7XF
Static task
static1
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
3d1a66bdce54970b321204708c962c89a9439755038c95f3e15ebec107b3f9f4
-
Size
1.2MB
-
MD5
5e6e24cf7cb4d8a015049e6191007af4
-
SHA1
1a1318ba2433b6e224b8ee0301c4436f971fcbc2
-
SHA256
3d1a66bdce54970b321204708c962c89a9439755038c95f3e15ebec107b3f9f4
-
SHA512
8a5a41de4c3e2d1a5ded8d8d12ddfa86c2f7e513186e0a83b43443e0c7a3a3247f5080091fbe99dde2e6f945e7d8597c89ad08dbd1ce2842d50cb54f792a14f7
-
SSDEEP
24576:/ogX4PvpDseL3ckNcZQrKxl3fXZ16b4PEPtYn1h7Xn6iZGyF:/doPLrcepKfBG4PEED7XF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-