General
-
Target
e8d951196f4555a427bc93f4c288bdd03ec9dc41df85a83b586c956527bffb31
-
Size
1.0MB
-
Sample
230324-emv5qsca86
-
MD5
d71015468b5bff4143a8ee90fbab3622
-
SHA1
12cdc4f4b170f8973e06929c5460cdd3670a42ce
-
SHA256
e8d951196f4555a427bc93f4c288bdd03ec9dc41df85a83b586c956527bffb31
-
SHA512
1eca04a597bc0b7685bb7fea664968a709be343f52ee9f7eaa85613dc905ca8235b20aca98deeb19f334e5304420c8638490d62c424bb2bdf91f3b48faab9621
-
SSDEEP
24576:pyJTF8BiGAonfu7gV3Qps7QG7m4PwfspUHAVX4o4JT0CDbS:cH87fZl2St7JPw04GX4oC0E
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
roxi
193.233.20.31:4125
-
auth_value
9d8be78c896acc3cf8b8a6637a221376
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
e8d951196f4555a427bc93f4c288bdd03ec9dc41df85a83b586c956527bffb31
-
Size
1.0MB
-
MD5
d71015468b5bff4143a8ee90fbab3622
-
SHA1
12cdc4f4b170f8973e06929c5460cdd3670a42ce
-
SHA256
e8d951196f4555a427bc93f4c288bdd03ec9dc41df85a83b586c956527bffb31
-
SHA512
1eca04a597bc0b7685bb7fea664968a709be343f52ee9f7eaa85613dc905ca8235b20aca98deeb19f334e5304420c8638490d62c424bb2bdf91f3b48faab9621
-
SSDEEP
24576:pyJTF8BiGAonfu7gV3Qps7QG7m4PwfspUHAVX4o4JT0CDbS:cH87fZl2St7JPw04GX4oC0E
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-