General
-
Target
fb8d1f90d48aaea7ea8204e54db39af6bf33f62500c99e00815f17c141992dc3
-
Size
1.2MB
-
Sample
230318-gyrmssde4y
-
MD5
849fe7f47d3795d0d67cbeaa7c45e6df
-
SHA1
a60656462b407aee6952ac2b444368eebefa2b8c
-
SHA256
fb8d1f90d48aaea7ea8204e54db39af6bf33f62500c99e00815f17c141992dc3
-
SHA512
bfbe0dfcce12824fbac51083d65555e8b4bff9f0bee14983a0b5435fa417cce533cf6fe0298b7aec2cf255dc51750bab8fcdb8c7fdeeb5dacabca6bf71a77d18
-
SSDEEP
24576:R+epUCH7to5fFMTy3tG2yAkU9ueUQ7JqaWIR1t88l8zXPekgvzpV:R+WUCHJoBFbw2Pf8rQdqIRjl2Kk
Static task
static1
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
fb8d1f90d48aaea7ea8204e54db39af6bf33f62500c99e00815f17c141992dc3
-
Size
1.2MB
-
MD5
849fe7f47d3795d0d67cbeaa7c45e6df
-
SHA1
a60656462b407aee6952ac2b444368eebefa2b8c
-
SHA256
fb8d1f90d48aaea7ea8204e54db39af6bf33f62500c99e00815f17c141992dc3
-
SHA512
bfbe0dfcce12824fbac51083d65555e8b4bff9f0bee14983a0b5435fa417cce533cf6fe0298b7aec2cf255dc51750bab8fcdb8c7fdeeb5dacabca6bf71a77d18
-
SSDEEP
24576:R+epUCH7to5fFMTy3tG2yAkU9ueUQ7JqaWIR1t88l8zXPekgvzpV:R+WUCHJoBFbw2Pf8rQdqIRjl2Kk
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-