General
-
Target
4910c00a67717235afae2f032f09eb82b425e21c6e230d4295d1bd0eb559b602
-
Size
1016KB
-
Sample
230421-r1a3yaaa4z
-
MD5
77b6153bd1db0cadebf2eeb298f3ce15
-
SHA1
31a7cf3a1f16353e5a8a91e9575663fcd19ed7f8
-
SHA256
4910c00a67717235afae2f032f09eb82b425e21c6e230d4295d1bd0eb559b602
-
SHA512
8a976b81c6cc526e376d5a3b4a8048d928325c979a520c5315a20bc7bc5b9059a7b03e11840c42ffe9f8170dc9b39a356634ebd19270a47b6e5f04ceac8d4dde
-
SSDEEP
12288:Vy90t2JXFJTyWtbG470WsPYs1yiKsWrMN9geLYV93reLKXqNcEICBmM+vssKxzLc:Vygey07lCYs42tg7e2cBICsQZOShw
Static task
static1
Behavioral task
behavioral1
Sample
4910c00a67717235afae2f032f09eb82b425e21c6e230d4295d1bd0eb559b602.exe
Resource
win10-20230220-en
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
redline
special
176.123.9.142:14845
-
auth_value
bb28ee957fad348ef1dfce97134849bc
Extracted
redline
cheat
62.108.37.195:16060
Extracted
redline
Heavan Dave
199.115.193.116:15763
-
auth_value
53923b5ff123b63db4445e5dfd21c16f
Targets
-
-
Target
4910c00a67717235afae2f032f09eb82b425e21c6e230d4295d1bd0eb559b602
-
Size
1016KB
-
MD5
77b6153bd1db0cadebf2eeb298f3ce15
-
SHA1
31a7cf3a1f16353e5a8a91e9575663fcd19ed7f8
-
SHA256
4910c00a67717235afae2f032f09eb82b425e21c6e230d4295d1bd0eb559b602
-
SHA512
8a976b81c6cc526e376d5a3b4a8048d928325c979a520c5315a20bc7bc5b9059a7b03e11840c42ffe9f8170dc9b39a356634ebd19270a47b6e5f04ceac8d4dde
-
SSDEEP
12288:Vy90t2JXFJTyWtbG470WsPYs1yiKsWrMN9geLYV93reLKXqNcEICBmM+vssKxzLc:Vygey07lCYs42tg7e2cBICsQZOShw
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-