General
-
Target
6dc9a4577e19ed344b425ea8b6bb117b162eb2ae206b2867594fec5f64439b8b
-
Size
1.4MB
-
Sample
230301-bmwvgsde8s
-
MD5
e561e00531bcd0ca9c6f1fd3734c3333
-
SHA1
2d4ca0b12c94de21c99b3d0436827c969925c4f4
-
SHA256
6dc9a4577e19ed344b425ea8b6bb117b162eb2ae206b2867594fec5f64439b8b
-
SHA512
0002fadd8f57b11cb2ee4d2ac5704ca45ce5036c8cf102d3bb4a108784982992b2ce350309f004dfaab73e7f8f5a55e4341e5b19e402a233eb97bba66ac22f6c
-
SSDEEP
24576:4yCc2PWyO7Ye6FAYqLmFvHav5HLN9wgDwEFeuLAf9Y6nS57:/Cc2hQYJF4LokoKHAf9/
Static task
static1
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.15/dF30Hn4m/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
6dc9a4577e19ed344b425ea8b6bb117b162eb2ae206b2867594fec5f64439b8b
-
Size
1.4MB
-
MD5
e561e00531bcd0ca9c6f1fd3734c3333
-
SHA1
2d4ca0b12c94de21c99b3d0436827c969925c4f4
-
SHA256
6dc9a4577e19ed344b425ea8b6bb117b162eb2ae206b2867594fec5f64439b8b
-
SHA512
0002fadd8f57b11cb2ee4d2ac5704ca45ce5036c8cf102d3bb4a108784982992b2ce350309f004dfaab73e7f8f5a55e4341e5b19e402a233eb97bba66ac22f6c
-
SSDEEP
24576:4yCc2PWyO7Ye6FAYqLmFvHav5HLN9wgDwEFeuLAf9Y6nS57:/Cc2hQYJF4LokoKHAf9/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-