General
-
Target
c4d6a54ba9a5834c92f5778f883cc74d363430a2a62f26ea87803721a46d35c5
-
Size
1.1MB
-
Sample
230321-hkgfcahb33
-
MD5
9a396a403531fcb64a3982e3d4eaff3d
-
SHA1
3f38dc1592d0dec90a7ec01d6fb00e4179ca3bcf
-
SHA256
c4d6a54ba9a5834c92f5778f883cc74d363430a2a62f26ea87803721a46d35c5
-
SHA512
cf3816944dce210c23000c8d8ad09451f2fe1770ace4cad08838215f31192e4496209d81b2a3be41c4afdc1ecf0974dad9d2f2f789cbbfd96b3f62d185f714a8
-
SSDEEP
24576:p1x4Y79vRMcmZBqkztFhjyDcLrai+hEmWF6:p7469vicSBl8f3E
Static task
static1
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
c4d6a54ba9a5834c92f5778f883cc74d363430a2a62f26ea87803721a46d35c5
-
Size
1.1MB
-
MD5
9a396a403531fcb64a3982e3d4eaff3d
-
SHA1
3f38dc1592d0dec90a7ec01d6fb00e4179ca3bcf
-
SHA256
c4d6a54ba9a5834c92f5778f883cc74d363430a2a62f26ea87803721a46d35c5
-
SHA512
cf3816944dce210c23000c8d8ad09451f2fe1770ace4cad08838215f31192e4496209d81b2a3be41c4afdc1ecf0974dad9d2f2f789cbbfd96b3f62d185f714a8
-
SSDEEP
24576:p1x4Y79vRMcmZBqkztFhjyDcLrai+hEmWF6:p7469vicSBl8f3E
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-