General
-
Target
6b1f5ee5c48d4c22792b07b5e4cbd25a1e21f3543178510b044b79d75c88211a
-
Size
1.0MB
-
Sample
230320-j2753acd99
-
MD5
9e4f1f765bc64125adba93bd0f162657
-
SHA1
997a0608ddea85e59fb211b42f5afe68ad287ec7
-
SHA256
6b1f5ee5c48d4c22792b07b5e4cbd25a1e21f3543178510b044b79d75c88211a
-
SHA512
7f04c4429e9fe24e8d8ab3b57f1dc03e1a3614c98ac5ea6f07ad8388eea4f39c3e3ca53a63fb9c73768376d57795d785a6b6a4ed6df935f2c086ad6f43d00160
-
SSDEEP
24576:tPKay4I7HW1XITQggn7pkwY5sCh8me5xZIBGZgj8J:TE7HYJn7p/ChaxeoZgj
Static task
static1
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
6b1f5ee5c48d4c22792b07b5e4cbd25a1e21f3543178510b044b79d75c88211a
-
Size
1.0MB
-
MD5
9e4f1f765bc64125adba93bd0f162657
-
SHA1
997a0608ddea85e59fb211b42f5afe68ad287ec7
-
SHA256
6b1f5ee5c48d4c22792b07b5e4cbd25a1e21f3543178510b044b79d75c88211a
-
SHA512
7f04c4429e9fe24e8d8ab3b57f1dc03e1a3614c98ac5ea6f07ad8388eea4f39c3e3ca53a63fb9c73768376d57795d785a6b6a4ed6df935f2c086ad6f43d00160
-
SSDEEP
24576:tPKay4I7HW1XITQggn7pkwY5sCh8me5xZIBGZgj8J:TE7HYJn7p/ChaxeoZgj
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-