General
-
Target
ca2707e584d4ada9d0625970c2cc333551d116cac37cd7b91821b8e528aa28df
-
Size
1.2MB
-
Sample
230319-v5wf8ahd32
-
MD5
3c348bcda27389febf8c959d57027991
-
SHA1
df0bcdc142880ba1b33bb682d1a029a0be151773
-
SHA256
ca2707e584d4ada9d0625970c2cc333551d116cac37cd7b91821b8e528aa28df
-
SHA512
ad9e81e3251ea9c42ad864dca072206e4041ea6c2a45f4ca2b023d67f51ba5044172ccf46abacb045feb2f988bb9fbe37f13bcfec6cc1f1d5aa0a2966d04d5fa
-
SSDEEP
24576:gqFGMYJWw4AoyK6ZtqJMQ7CmEx/5TWv8Z5FwRJ7VgwL0IvySZhH:gqHY4ApXZM+QMx/5c45FmJRd
Static task
static1
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
ca2707e584d4ada9d0625970c2cc333551d116cac37cd7b91821b8e528aa28df
-
Size
1.2MB
-
MD5
3c348bcda27389febf8c959d57027991
-
SHA1
df0bcdc142880ba1b33bb682d1a029a0be151773
-
SHA256
ca2707e584d4ada9d0625970c2cc333551d116cac37cd7b91821b8e528aa28df
-
SHA512
ad9e81e3251ea9c42ad864dca072206e4041ea6c2a45f4ca2b023d67f51ba5044172ccf46abacb045feb2f988bb9fbe37f13bcfec6cc1f1d5aa0a2966d04d5fa
-
SSDEEP
24576:gqFGMYJWw4AoyK6ZtqJMQ7CmEx/5TWv8Z5FwRJ7VgwL0IvySZhH:gqHY4ApXZM+QMx/5c45FmJRd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-