General
-
Target
4be90b20ae4481b6bb3cf7ed742dd92053f55cb9cad01a473d455f5a904fc37e
-
Size
975KB
-
Sample
230403-t8x9jsfh85
-
MD5
80827fcd900fbb435c0908f55798f9b3
-
SHA1
0316ae12bb9bc4ff37b9bfe0aeb7099345cd8a11
-
SHA256
4be90b20ae4481b6bb3cf7ed742dd92053f55cb9cad01a473d455f5a904fc37e
-
SHA512
4a276cd7a4a821c20287678fbcb92c54cc10f2ffc8fd6814ec5d948bf5885867935cdf68369d6c39bc4ff6c0645811701a87c3a73fd172fc0e4ed84761c706a1
-
SSDEEP
24576:Gy8XlLeDPdjd32TToixrPsD5c3LFgL61SsX6KKxYI6AR:VY07BdmfUD50+u1JqoX
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nord
176.113.115.145:4125
-
auth_value
ebb7d38cdbd7c83cf6363ef3feb3a530
Extracted
amadey
3.69
193.233.20.29/games/category/index.php
Targets
-
-
Target
4be90b20ae4481b6bb3cf7ed742dd92053f55cb9cad01a473d455f5a904fc37e
-
Size
975KB
-
MD5
80827fcd900fbb435c0908f55798f9b3
-
SHA1
0316ae12bb9bc4ff37b9bfe0aeb7099345cd8a11
-
SHA256
4be90b20ae4481b6bb3cf7ed742dd92053f55cb9cad01a473d455f5a904fc37e
-
SHA512
4a276cd7a4a821c20287678fbcb92c54cc10f2ffc8fd6814ec5d948bf5885867935cdf68369d6c39bc4ff6c0645811701a87c3a73fd172fc0e4ed84761c706a1
-
SSDEEP
24576:Gy8XlLeDPdjd32TToixrPsD5c3LFgL61SsX6KKxYI6AR:VY07BdmfUD50+u1JqoX
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-