General
-
Target
b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc
-
Size
1.4MB
-
Sample
230302-l2jhtaca7y
-
MD5
b8adbc1a0523ed53d82bfc31c40b2b08
-
SHA1
2ea884f4c0eb4b23b74d65f7168e1aac66741959
-
SHA256
b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc
-
SHA512
8c78df002df7fb30637797b8c195f9710c21a811a9399741381733cfc61b6cba710f7e98c0d7ee58ca75982e6ba90dd9a6698bbb1201ef9a915ec61dc2f5b518
-
SSDEEP
24576:hyrMzDizMkq9kWr1uh3/CinGt7C41MuOmBhMRRYrKh+fD3FY:Uo/iAkWr1wa2Gt7CuMuO2MRRYbf
Static task
static1
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Targets
-
-
Target
b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc
-
Size
1.4MB
-
MD5
b8adbc1a0523ed53d82bfc31c40b2b08
-
SHA1
2ea884f4c0eb4b23b74d65f7168e1aac66741959
-
SHA256
b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc
-
SHA512
8c78df002df7fb30637797b8c195f9710c21a811a9399741381733cfc61b6cba710f7e98c0d7ee58ca75982e6ba90dd9a6698bbb1201ef9a915ec61dc2f5b518
-
SSDEEP
24576:hyrMzDizMkq9kWr1uh3/CinGt7C41MuOmBhMRRYrKh+fD3FY:Uo/iAkWr1wa2Gt7CuMuO2MRRYbf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-