General
-
Target
01ab37cc189c95fd1637f33b1fbf4c151d6e1b3e7f64030606ccc70761db2991
-
Size
739KB
-
Sample
230302-rzy4dada2w
-
MD5
e7f5f3d52d01243e4e66d075d58795a9
-
SHA1
47abb397bf38618ede4a307008023aee7e700532
-
SHA256
01ab37cc189c95fd1637f33b1fbf4c151d6e1b3e7f64030606ccc70761db2991
-
SHA512
141503b7bd7141bfc2c3e135a88f2d86bd5c21ee2798300d49dc436a5541f8a5e8757693812ed4f5ed4c25ba2fc93a6d459509fc372178373cde29854d8a0324
-
SSDEEP
12288:9MrRy90RXtkVAlvE44luCFdLIauvn+u/65IUktzB0+Spx9xXqswyLkg2Ff6ozQ:gyNVAm4tgd6Oo0+AXxaswySFf6J
Static task
static1
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Targets
-
-
Target
01ab37cc189c95fd1637f33b1fbf4c151d6e1b3e7f64030606ccc70761db2991
-
Size
739KB
-
MD5
e7f5f3d52d01243e4e66d075d58795a9
-
SHA1
47abb397bf38618ede4a307008023aee7e700532
-
SHA256
01ab37cc189c95fd1637f33b1fbf4c151d6e1b3e7f64030606ccc70761db2991
-
SHA512
141503b7bd7141bfc2c3e135a88f2d86bd5c21ee2798300d49dc436a5541f8a5e8757693812ed4f5ed4c25ba2fc93a6d459509fc372178373cde29854d8a0324
-
SSDEEP
12288:9MrRy90RXtkVAlvE44luCFdLIauvn+u/65IUktzB0+Spx9xXqswyLkg2Ff6ozQ:gyNVAm4tgd6Oo0+AXxaswySFf6J
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-