General
-
Target
cf9af666be683ffd5f231ff17aaa2825f650e12bf5d4f56ddb03a95ee27e04aa
-
Size
1.2MB
-
Sample
230414-qcfg3shh78
-
MD5
24bd4424a78bbdfc42a67e38bf47dcd1
-
SHA1
972f9e16610a39da65a5a3c65314596d7ceb0a2c
-
SHA256
cf9af666be683ffd5f231ff17aaa2825f650e12bf5d4f56ddb03a95ee27e04aa
-
SHA512
872babcd7206d847fb92856fc4ca05dae03a1265b2258f157a3c0258b5cc81fd6e5eadff81b70709c136aa96f7293ea01b12cc32f42296059f4f962970d9b83d
-
SSDEEP
24576:py20Ly6bGXW0pOL9OlUK4I4ok6tkaYm3cxB+pJ4SSt3O:c27FXn8VW1k6tkx4cxB+nzS
Static task
static1
Malware Config
Extracted
redline
soft
77.91.124.146:4121
-
auth_value
e65663e455bca3c5699650b66e76ceaa
Extracted
redline
dirx
77.91.124.146:4121
-
auth_value
522d988f763be056e53e089f74d464cc
Targets
-
-
Target
cf9af666be683ffd5f231ff17aaa2825f650e12bf5d4f56ddb03a95ee27e04aa
-
Size
1.2MB
-
MD5
24bd4424a78bbdfc42a67e38bf47dcd1
-
SHA1
972f9e16610a39da65a5a3c65314596d7ceb0a2c
-
SHA256
cf9af666be683ffd5f231ff17aaa2825f650e12bf5d4f56ddb03a95ee27e04aa
-
SHA512
872babcd7206d847fb92856fc4ca05dae03a1265b2258f157a3c0258b5cc81fd6e5eadff81b70709c136aa96f7293ea01b12cc32f42296059f4f962970d9b83d
-
SSDEEP
24576:py20Ly6bGXW0pOL9OlUK4I4ok6tkaYm3cxB+pJ4SSt3O:c27FXn8VW1k6tkx4cxB+nzS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-