General
-
Target
36c212f2cda6dd81c6b09ee9192086b8f52a8f71ae6ea186642d41dddf7add42
-
Size
844KB
-
Sample
230411-nnapvscb33
-
MD5
4905d08fccf6e8ac49c5b354021b0233
-
SHA1
f7767f8e15657a9c7a08b347177d7614e3f8c58a
-
SHA256
36c212f2cda6dd81c6b09ee9192086b8f52a8f71ae6ea186642d41dddf7add42
-
SHA512
3c78a63b5fa53f4904ef7afdf713c2ca60b6c74f821d3c655bbd1ec496c00aa549197b6f1b6aeb941309b5a7447e101ccaf5602fc95c3296efdf719a982dccd7
-
SSDEEP
12288:3MrLy90qcOTz4sJ898aWSwm/rbCfno3hvvez1Pu7b5zjKpWqbMZ4V:wyDz4XxW1mr9xvvepPu7Vj6MOV
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Targets
-
-
Target
36c212f2cda6dd81c6b09ee9192086b8f52a8f71ae6ea186642d41dddf7add42
-
Size
844KB
-
MD5
4905d08fccf6e8ac49c5b354021b0233
-
SHA1
f7767f8e15657a9c7a08b347177d7614e3f8c58a
-
SHA256
36c212f2cda6dd81c6b09ee9192086b8f52a8f71ae6ea186642d41dddf7add42
-
SHA512
3c78a63b5fa53f4904ef7afdf713c2ca60b6c74f821d3c655bbd1ec496c00aa549197b6f1b6aeb941309b5a7447e101ccaf5602fc95c3296efdf719a982dccd7
-
SSDEEP
12288:3MrLy90qcOTz4sJ898aWSwm/rbCfno3hvvez1Pu7b5zjKpWqbMZ4V:wyDz4XxW1mr9xvvepPu7Vj6MOV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-