General
-
Target
89a1c43ef5419e48f963c442d636db21b91a863b102e6810edda1cb0b98121d7
-
Size
1.3MB
-
Sample
230301-p8pvysgc33
-
MD5
39c6dc0191fc9cf5be13bfdbc7dbf5af
-
SHA1
457a36c72d47c744cda256f5c76794b142e4a35a
-
SHA256
89a1c43ef5419e48f963c442d636db21b91a863b102e6810edda1cb0b98121d7
-
SHA512
574948bf5f902f40fd6de138c9976265b4201df7a1a17896d5e97685cf9303b2e93d5559641c30e4767b9172a1acdecbcd225cc06aa8e11680ed23d1aaf77820
-
SSDEEP
24576:OyYJ+dAiWd0EYNWQXVROdcLPaC/KkJVktmpHQxbIQWLAETu/I/b9EcFI/d:dYJaWaaQmdcuCBJkmmxNSnTKI/b9Ew
Static task
static1
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Targets
-
-
Target
89a1c43ef5419e48f963c442d636db21b91a863b102e6810edda1cb0b98121d7
-
Size
1.3MB
-
MD5
39c6dc0191fc9cf5be13bfdbc7dbf5af
-
SHA1
457a36c72d47c744cda256f5c76794b142e4a35a
-
SHA256
89a1c43ef5419e48f963c442d636db21b91a863b102e6810edda1cb0b98121d7
-
SHA512
574948bf5f902f40fd6de138c9976265b4201df7a1a17896d5e97685cf9303b2e93d5559641c30e4767b9172a1acdecbcd225cc06aa8e11680ed23d1aaf77820
-
SSDEEP
24576:OyYJ+dAiWd0EYNWQXVROdcLPaC/KkJVktmpHQxbIQWLAETu/I/b9EcFI/d:dYJaWaaQmdcuCBJkmmxNSnTKI/b9Ew
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-