General
-
Target
d8cf53679393ac6f9fb15d00a744229dd9519574bb0c29fb71c551a3a9e5cc6b
-
Size
1010KB
-
Sample
230324-n11rtagb7v
-
MD5
98516edc4255f89f9a27851c9f8cb4f5
-
SHA1
5f1d4ba8e22c9b9b992a012b1e9d1060e507d7fc
-
SHA256
d8cf53679393ac6f9fb15d00a744229dd9519574bb0c29fb71c551a3a9e5cc6b
-
SHA512
0fa775bd324846ccaa1b77cdaa4dc0c2e3809dda94bdce20bbf4fda8c322bcb6ab89cf2743f089b6e7a7ecd7081b13e70a65aef7b1e75986f9f1f65822db548d
-
SSDEEP
24576:AyWx7EFSP/NuEzLVbPmu80CQIfqkydvL3+O9iXr1ri:HWxYFyp3Vbb8A6yxb+OWr
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
volya
193.233.20.31:4125
-
auth_value
0efc9f002a9fbeec5f8b8338141d546a
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
d8cf53679393ac6f9fb15d00a744229dd9519574bb0c29fb71c551a3a9e5cc6b
-
Size
1010KB
-
MD5
98516edc4255f89f9a27851c9f8cb4f5
-
SHA1
5f1d4ba8e22c9b9b992a012b1e9d1060e507d7fc
-
SHA256
d8cf53679393ac6f9fb15d00a744229dd9519574bb0c29fb71c551a3a9e5cc6b
-
SHA512
0fa775bd324846ccaa1b77cdaa4dc0c2e3809dda94bdce20bbf4fda8c322bcb6ab89cf2743f089b6e7a7ecd7081b13e70a65aef7b1e75986f9f1f65822db548d
-
SSDEEP
24576:AyWx7EFSP/NuEzLVbPmu80CQIfqkydvL3+O9iXr1ri:HWxYFyp3Vbb8A6yxb+OWr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-