General
-
Target
348b05aac10d104b00c7180d35f203f1cfbcfffc0867d47dc386a16d7946ab90
-
Size
1.2MB
-
Sample
230318-czb7aaah79
-
MD5
f8f9f1d46735042de799fe979e97cb02
-
SHA1
8525c4fb92d15604f8f7fe2d0a856249360c8118
-
SHA256
348b05aac10d104b00c7180d35f203f1cfbcfffc0867d47dc386a16d7946ab90
-
SHA512
09558253b5348313e33256e47809745440e3f7a84b9e0908831470f2eb1723cb9973a3ca12c7b0cd6b2368dac2246b6c63fe31771d253291117a46fe621113a1
-
SSDEEP
24576:0/2WGBYAAi70X42LDcFs2v/U4kKrT9dudKFtV:07GH7Qxov/U49T9d
Static task
static1
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
348b05aac10d104b00c7180d35f203f1cfbcfffc0867d47dc386a16d7946ab90
-
Size
1.2MB
-
MD5
f8f9f1d46735042de799fe979e97cb02
-
SHA1
8525c4fb92d15604f8f7fe2d0a856249360c8118
-
SHA256
348b05aac10d104b00c7180d35f203f1cfbcfffc0867d47dc386a16d7946ab90
-
SHA512
09558253b5348313e33256e47809745440e3f7a84b9e0908831470f2eb1723cb9973a3ca12c7b0cd6b2368dac2246b6c63fe31771d253291117a46fe621113a1
-
SSDEEP
24576:0/2WGBYAAi70X42LDcFs2v/U4kKrT9dudKFtV:07GH7Qxov/U49T9d
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-