General
-
Target
709a4477422b83973642c8f5d14d6ccf167e2e7695c47b19f1cdae6dd36086aa
-
Size
1.0MB
-
Sample
230328-2jq3yadf98
-
MD5
87c825d4cdad49e7a0d6698680e87996
-
SHA1
e7d3dd40f5b05362bd0a0fb672cfb7a0b3204d63
-
SHA256
709a4477422b83973642c8f5d14d6ccf167e2e7695c47b19f1cdae6dd36086aa
-
SHA512
144c10a2771fef2243f590d493649253c520957439270d7d1362e4d2c4a87c17a8f667590c4c77b660152a54fd50d04d565b4a625db35814dfcb345e0f4f7970
-
SSDEEP
24576:Fy7i62XmzbBxDadVoNCOy5YzeVUKezkVYXmPy:gFD3DgVo0XYz3gV4
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
budda
176.113.115.145:4125
-
auth_value
817135bbb606487d8a499e3dc1974b43
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
709a4477422b83973642c8f5d14d6ccf167e2e7695c47b19f1cdae6dd36086aa
-
Size
1.0MB
-
MD5
87c825d4cdad49e7a0d6698680e87996
-
SHA1
e7d3dd40f5b05362bd0a0fb672cfb7a0b3204d63
-
SHA256
709a4477422b83973642c8f5d14d6ccf167e2e7695c47b19f1cdae6dd36086aa
-
SHA512
144c10a2771fef2243f590d493649253c520957439270d7d1362e4d2c4a87c17a8f667590c4c77b660152a54fd50d04d565b4a625db35814dfcb345e0f4f7970
-
SSDEEP
24576:Fy7i62XmzbBxDadVoNCOy5YzeVUKezkVYXmPy:gFD3DgVo0XYz3gV4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-