General
-
Target
f5cc687b97fc23b7e90f9e8b8ba856827fb2a96e42864c14fc0226435dec572a
-
Size
1.3MB
-
Sample
230321-wr28aacd47
-
MD5
2812cf938daea2fee0e48953f233d449
-
SHA1
17258f210d547a68e35ec03e9c3da4a261aa52f3
-
SHA256
f5cc687b97fc23b7e90f9e8b8ba856827fb2a96e42864c14fc0226435dec572a
-
SHA512
b80b8093178696ea229b7301ced7bb583f9c7c5c14a13e2d9b9e63f17913f4153a4724a3c672e37fb5f982a2f31df3e2842b3a6f4c7106a7eca5012c512fe270
-
SSDEEP
24576:PF1nHyFZau43z3+pRsoJXSUMHI1ogR6ghfPfu7z5f3:PY43b+L1gUMHIugMYf2
Static task
static1
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
f5cc687b97fc23b7e90f9e8b8ba856827fb2a96e42864c14fc0226435dec572a
-
Size
1.3MB
-
MD5
2812cf938daea2fee0e48953f233d449
-
SHA1
17258f210d547a68e35ec03e9c3da4a261aa52f3
-
SHA256
f5cc687b97fc23b7e90f9e8b8ba856827fb2a96e42864c14fc0226435dec572a
-
SHA512
b80b8093178696ea229b7301ced7bb583f9c7c5c14a13e2d9b9e63f17913f4153a4724a3c672e37fb5f982a2f31df3e2842b3a6f4c7106a7eca5012c512fe270
-
SSDEEP
24576:PF1nHyFZau43z3+pRsoJXSUMHI1ogR6ghfPfu7z5f3:PY43b+L1gUMHIugMYf2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-