General
-
Target
66df02d7a27906a4f2488ea7c37df0d8a2693fe84629932d25de7e21f091cb11
-
Size
1.5MB
-
Sample
230414-fbc1fsgb65
-
MD5
c1c36223ca846caeda21048ec4117bb5
-
SHA1
6173ee4fbb8555b16856848872fa9d79e739ead0
-
SHA256
66df02d7a27906a4f2488ea7c37df0d8a2693fe84629932d25de7e21f091cb11
-
SHA512
a693afbd0fbb6cb64e8fd057fa344130bbc53a975678bda0ff590edaa2e3ca484f3cbc72f0830efe3f7434f611fdfa12ff45b689bc77486b02dd016c6b219e28
-
SSDEEP
24576:UypF0SA7YZ7ikb04qa4qR3VK27MMCjQdNn0W4bcV7cLMxkYcNsliCm:j7tA7YZ7ikAd/qjK24MCjQd+QV7L1
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
masi
185.161.248.90:4125
-
auth_value
6e26457e57602c4cf35356c36d8dd8e8
Targets
-
-
Target
66df02d7a27906a4f2488ea7c37df0d8a2693fe84629932d25de7e21f091cb11
-
Size
1.5MB
-
MD5
c1c36223ca846caeda21048ec4117bb5
-
SHA1
6173ee4fbb8555b16856848872fa9d79e739ead0
-
SHA256
66df02d7a27906a4f2488ea7c37df0d8a2693fe84629932d25de7e21f091cb11
-
SHA512
a693afbd0fbb6cb64e8fd057fa344130bbc53a975678bda0ff590edaa2e3ca484f3cbc72f0830efe3f7434f611fdfa12ff45b689bc77486b02dd016c6b219e28
-
SSDEEP
24576:UypF0SA7YZ7ikb04qa4qR3VK27MMCjQdNn0W4bcV7cLMxkYcNsliCm:j7tA7YZ7ikAd/qjK24MCjQd+QV7L1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-