General
-
Target
823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2
-
Size
1.3MB
-
Sample
230301-l4hdjafg26
-
MD5
4a8d540c4f8068105cc2a6f40d9ec225
-
SHA1
756dee78851ef984314c944e973cb2e29989ef45
-
SHA256
823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2
-
SHA512
241d726e86552c55575585a2df1b79a7837affb272979a54633508a348b9a8b1c05d149e692e18a35b3cd8d55812a670071e022825efa0c5bfad051d8c408c7a
-
SSDEEP
24576:HyHMgeMqG0Juus4wN7rzz6zT8J7raSBGwtiP1wFziKgMfDtv9ytfSUkfFZ4:SHwwxaSB7EPydgUEtfPkNZ
Static task
static1
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2
-
Size
1.3MB
-
MD5
4a8d540c4f8068105cc2a6f40d9ec225
-
SHA1
756dee78851ef984314c944e973cb2e29989ef45
-
SHA256
823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2
-
SHA512
241d726e86552c55575585a2df1b79a7837affb272979a54633508a348b9a8b1c05d149e692e18a35b3cd8d55812a670071e022825efa0c5bfad051d8c408c7a
-
SSDEEP
24576:HyHMgeMqG0Juus4wN7rzz6zT8J7raSBGwtiP1wFziKgMfDtv9ytfSUkfFZ4:SHwwxaSB7EPydgUEtfPkNZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-