General
-
Target
7524b0ab2f41de4a4bb143a65e0750f2eeb4ae6a9d07301f5d877ae879a5403c
-
Size
1.2MB
-
Sample
230318-hybf9adf41
-
MD5
09bb0c50e8c105cb2b11ae342738df1f
-
SHA1
034df9e4dc3f04eb4edefb847c043ff166f03963
-
SHA256
7524b0ab2f41de4a4bb143a65e0750f2eeb4ae6a9d07301f5d877ae879a5403c
-
SHA512
a0c9ab1b2a203f2af91739df4967d619b72ee38083ab9227d0c7077427f92a2e39b53ef10947462271c987813124097ed870ef9952cbfb00c7a7cb6efcd5c191
-
SSDEEP
24576:E3fA/X9x8NfB7bCvJpAaUQMz5itmXaZH/BV:EISfBnyXAPFQis
Static task
static1
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
7524b0ab2f41de4a4bb143a65e0750f2eeb4ae6a9d07301f5d877ae879a5403c
-
Size
1.2MB
-
MD5
09bb0c50e8c105cb2b11ae342738df1f
-
SHA1
034df9e4dc3f04eb4edefb847c043ff166f03963
-
SHA256
7524b0ab2f41de4a4bb143a65e0750f2eeb4ae6a9d07301f5d877ae879a5403c
-
SHA512
a0c9ab1b2a203f2af91739df4967d619b72ee38083ab9227d0c7077427f92a2e39b53ef10947462271c987813124097ed870ef9952cbfb00c7a7cb6efcd5c191
-
SSDEEP
24576:E3fA/X9x8NfB7bCvJpAaUQMz5itmXaZH/BV:EISfBnyXAPFQis
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-