General
-
Target
51119439df293d0219fff3a3f9cf7b61d52089ab0d40aea159dd1a1048581d88
-
Size
1008KB
-
Sample
230402-q25hhagf37
-
MD5
44450c76f0aa5aa043b3fb333d66c557
-
SHA1
bc514fde10e2993f5e98ce90b4a0cb1f0bfa68ad
-
SHA256
51119439df293d0219fff3a3f9cf7b61d52089ab0d40aea159dd1a1048581d88
-
SHA512
9ae1fecfd3addb779c6982336a3ff16d64ee142834f026b16dcb19524175984e05b97afc7f80d092f923dbcf13e6ed2819cadfcef40a2794ba1e6aa53061d002
-
SSDEEP
24576:/ymEViJw54KqbaExeYF10xUqUdooLdgQHVXcO5rRP1YDYsWToqp8:KmE0J24vbTZ6HUdoorHVcO5r3DsJ4
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nord
176.113.115.145:4125
-
auth_value
ebb7d38cdbd7c83cf6363ef3feb3a530
Extracted
amadey
3.69
193.233.20.29/games/category/index.php
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
51119439df293d0219fff3a3f9cf7b61d52089ab0d40aea159dd1a1048581d88
-
Size
1008KB
-
MD5
44450c76f0aa5aa043b3fb333d66c557
-
SHA1
bc514fde10e2993f5e98ce90b4a0cb1f0bfa68ad
-
SHA256
51119439df293d0219fff3a3f9cf7b61d52089ab0d40aea159dd1a1048581d88
-
SHA512
9ae1fecfd3addb779c6982336a3ff16d64ee142834f026b16dcb19524175984e05b97afc7f80d092f923dbcf13e6ed2819cadfcef40a2794ba1e6aa53061d002
-
SSDEEP
24576:/ymEViJw54KqbaExeYF10xUqUdooLdgQHVXcO5rRP1YDYsWToqp8:KmE0J24vbTZ6HUdoorHVcO5r3DsJ4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-