General
-
Target
4e64e55c3c1c65882f2dbd8e52e15f3a3292be548674ba13b6a0a031b2281fa8
-
Size
1020KB
-
Sample
230323-2bm2baae67
-
MD5
196463e761f758cfeca0c42fa4bfb080
-
SHA1
e6684597bfd35c83a04e0e28718a0a64421aa833
-
SHA256
4e64e55c3c1c65882f2dbd8e52e15f3a3292be548674ba13b6a0a031b2281fa8
-
SHA512
36ffd6178bf896c30981a688f86c55a28b7c16b616dbf8cfb93b8bbb5ee6eb48a75ba815ef0374a44ffd6c934c8c7c9e3091affad5622bd357d5852560f28dd5
-
SSDEEP
24576:hySpK1rkfxPoG8EDo83edJ6yLo5SFVM84kb16Q:UQfxAz83eqyE8Vfb1
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
trap
193.233.20.30:4125
-
auth_value
b39a737e2e9eba88e48ab88d1061be9c
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
4e64e55c3c1c65882f2dbd8e52e15f3a3292be548674ba13b6a0a031b2281fa8
-
Size
1020KB
-
MD5
196463e761f758cfeca0c42fa4bfb080
-
SHA1
e6684597bfd35c83a04e0e28718a0a64421aa833
-
SHA256
4e64e55c3c1c65882f2dbd8e52e15f3a3292be548674ba13b6a0a031b2281fa8
-
SHA512
36ffd6178bf896c30981a688f86c55a28b7c16b616dbf8cfb93b8bbb5ee6eb48a75ba815ef0374a44ffd6c934c8c7c9e3091affad5622bd357d5852560f28dd5
-
SSDEEP
24576:hySpK1rkfxPoG8EDo83edJ6yLo5SFVM84kb16Q:UQfxAz83eqyE8Vfb1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-