General
-
Target
f3921ed55f11f27a27ce99de6c74a9b4a8cf1ba681b47cd19496c31d42326ab7
-
Size
988KB
-
Sample
230304-g1gwdacd4w
-
MD5
524603bee7786cb297d7fad6acecd24c
-
SHA1
58b4fcf4d72034ed29202fa852954bac692b17a1
-
SHA256
f3921ed55f11f27a27ce99de6c74a9b4a8cf1ba681b47cd19496c31d42326ab7
-
SHA512
14e364916f6c4c3c076f1f1233727c33b6121c1bf13ac96005155fdaeb6e6cd034e7fcaf952941c9b58874767e6a2961ef979986989a379c91c6069a6af47a72
-
SSDEEP
12288:9Mrpy90918MI4gkNspIHIoEoZWqm9+uiAbAAtSoLTNUYQp8GgxM0cO2qoHgbZpui:4y61+4hstoEGpATC8PxMvpgd/cdmHHt
Static task
static1
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
f3921ed55f11f27a27ce99de6c74a9b4a8cf1ba681b47cd19496c31d42326ab7
-
Size
988KB
-
MD5
524603bee7786cb297d7fad6acecd24c
-
SHA1
58b4fcf4d72034ed29202fa852954bac692b17a1
-
SHA256
f3921ed55f11f27a27ce99de6c74a9b4a8cf1ba681b47cd19496c31d42326ab7
-
SHA512
14e364916f6c4c3c076f1f1233727c33b6121c1bf13ac96005155fdaeb6e6cd034e7fcaf952941c9b58874767e6a2961ef979986989a379c91c6069a6af47a72
-
SSDEEP
12288:9Mrpy90918MI4gkNspIHIoEoZWqm9+uiAbAAtSoLTNUYQp8GgxM0cO2qoHgbZpui:4y61+4hstoEGpATC8PxMvpgd/cdmHHt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-