General
-
Target
5cccc9292a17df6efdf282da545e9fb5e24d1f1be92c402be6618b2f4b34591a
-
Size
1022KB
-
Sample
230323-qgbdxshg6w
-
MD5
f1d836b1f8b72545ecc1f5552bc905c0
-
SHA1
98ed7d4ca75dae65a9a32b6d80f662ab26db7c07
-
SHA256
5cccc9292a17df6efdf282da545e9fb5e24d1f1be92c402be6618b2f4b34591a
-
SHA512
5a490f0e2822e3755ed1430ba6d75e0a49a7ca81e0ecf05bea82179aebc9e45f32914cf97ed8557a64a06f1b66c2db37761822cdddc5a943b8dcd1d2b6dc867a
-
SSDEEP
24576:CyGZjCs4RAgcLjr8vVTl47j2glPxgJDa6bdi6n2Uo6YTQMl1U:pYjCs4Gg2jr8NTepqta6Ji5FQM
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
trap
193.233.20.30:4125
-
auth_value
b39a737e2e9eba88e48ab88d1061be9c
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
5cccc9292a17df6efdf282da545e9fb5e24d1f1be92c402be6618b2f4b34591a
-
Size
1022KB
-
MD5
f1d836b1f8b72545ecc1f5552bc905c0
-
SHA1
98ed7d4ca75dae65a9a32b6d80f662ab26db7c07
-
SHA256
5cccc9292a17df6efdf282da545e9fb5e24d1f1be92c402be6618b2f4b34591a
-
SHA512
5a490f0e2822e3755ed1430ba6d75e0a49a7ca81e0ecf05bea82179aebc9e45f32914cf97ed8557a64a06f1b66c2db37761822cdddc5a943b8dcd1d2b6dc867a
-
SSDEEP
24576:CyGZjCs4RAgcLjr8vVTl47j2glPxgJDa6bdi6n2Uo6YTQMl1U:pYjCs4Gg2jr8NTepqta6Ji5FQM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-