General
-
Target
16cc44d6210b1dc7d2d8109f6dec2d86f883522b529f46fd7ca1ff5468015573
-
Size
726KB
-
Sample
230611-fey24age92
-
MD5
0da6ef35b32261364273ee3cbb866ae3
-
SHA1
af75890c0fd18bfcddddafa5c6cd1aa62ca9210c
-
SHA256
16cc44d6210b1dc7d2d8109f6dec2d86f883522b529f46fd7ca1ff5468015573
-
SHA512
cd9627e68d5998f5f34dbd6441c61db6546aeed05b629b06f97974eaeeea8f127e22cd99dd4cf24cf24f202dfcd31b5ab03cfc9e6184988386dabe3350fe6475
-
SSDEEP
12288:4Mrry90hGGRCrJ4T5OFvrcFgas0SI3dRy7nURm/DOLcK+oU1qNnc9vyD58uk+QSO:zylGRCrJ4VOFvr3H0vy7nURgD+9+5160
Static task
static1
Behavioral task
behavioral1
Sample
16cc44d6210b1dc7d2d8109f6dec2d86f883522b529f46fd7ca1ff5468015573.exe
Resource
win7-20230220-en
Malware Config
Extracted
redline
dast
83.97.73.129:19068
-
auth_value
17d71bf1a3f93284f5848e00b0dd8222
Extracted
amadey
3.83
77.91.68.30/music/rock/index.php
Extracted
redline
crazy
83.97.73.129:19068
-
auth_value
66bc4d9682ea090eef64a299ece12fdd
Targets
-
-
Target
16cc44d6210b1dc7d2d8109f6dec2d86f883522b529f46fd7ca1ff5468015573
-
Size
726KB
-
MD5
0da6ef35b32261364273ee3cbb866ae3
-
SHA1
af75890c0fd18bfcddddafa5c6cd1aa62ca9210c
-
SHA256
16cc44d6210b1dc7d2d8109f6dec2d86f883522b529f46fd7ca1ff5468015573
-
SHA512
cd9627e68d5998f5f34dbd6441c61db6546aeed05b629b06f97974eaeeea8f127e22cd99dd4cf24cf24f202dfcd31b5ab03cfc9e6184988386dabe3350fe6475
-
SSDEEP
12288:4Mrry90hGGRCrJ4T5OFvrcFgas0SI3dRy7nURm/DOLcK+oU1qNnc9vyD58uk+QSO:zylGRCrJ4VOFvr3H0vy7nURgD+9+5160
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-