General
-
Target
e5ef5ac327eb750ccf20d193afe786d7504285e10e275207fe96eb6f0720bd1f
-
Size
1.0MB
-
Sample
230320-3jkrlafg87
-
MD5
49056c9ac20cdfe5c20487b5a08ce7d5
-
SHA1
525e5a95eb7aafea237c6f52dc05c4b448ceefd2
-
SHA256
e5ef5ac327eb750ccf20d193afe786d7504285e10e275207fe96eb6f0720bd1f
-
SHA512
95dd0bb67d34f0f24fc9e6a55710eee0f56dd636baf5435e8f9e1be11bd185cce6a6f6f56bd0d46ae9e9c56cc9e03eaa745963ba4f1bb24b9cd34ecb2c0e8d0f
-
SSDEEP
24576:7x9AMUUdzbF054Lzkiun+WcEtB/PWwufJzW16hK+wyzWY:7Bl24B+JHWwkJzW1oRwyz
Static task
static1
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
e5ef5ac327eb750ccf20d193afe786d7504285e10e275207fe96eb6f0720bd1f
-
Size
1.0MB
-
MD5
49056c9ac20cdfe5c20487b5a08ce7d5
-
SHA1
525e5a95eb7aafea237c6f52dc05c4b448ceefd2
-
SHA256
e5ef5ac327eb750ccf20d193afe786d7504285e10e275207fe96eb6f0720bd1f
-
SHA512
95dd0bb67d34f0f24fc9e6a55710eee0f56dd636baf5435e8f9e1be11bd185cce6a6f6f56bd0d46ae9e9c56cc9e03eaa745963ba4f1bb24b9cd34ecb2c0e8d0f
-
SSDEEP
24576:7x9AMUUdzbF054Lzkiun+WcEtB/PWwufJzW16hK+wyzWY:7Bl24B+JHWwkJzW1oRwyz
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-