General
-
Target
cfe0b3f67692f821433c7cb33b19f16dc37fac83c7ba557616067a0b12773ee9
-
Size
1.1MB
-
Sample
230321-hx3t4sbb6t
-
MD5
f15708e0bcd8a36741ecac308cf8c241
-
SHA1
2e76ca15f391e850c70b6c58106385b073fce94f
-
SHA256
cfe0b3f67692f821433c7cb33b19f16dc37fac83c7ba557616067a0b12773ee9
-
SHA512
c9be377b9fc3ec72f9296fc0eb0eddf86c308fd48a065dbe172ae4d16b67a3a20f85ceac545c5150c59b3f0fc8b812e9016650b3e3e6cde5080f85b7afdd183d
-
SSDEEP
24576:s1x4Y79vRMcmZBqkztFhjyDcLrai+hEmWF6:s7469vicSBl8f3E
Static task
static1
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
cfe0b3f67692f821433c7cb33b19f16dc37fac83c7ba557616067a0b12773ee9
-
Size
1.1MB
-
MD5
f15708e0bcd8a36741ecac308cf8c241
-
SHA1
2e76ca15f391e850c70b6c58106385b073fce94f
-
SHA256
cfe0b3f67692f821433c7cb33b19f16dc37fac83c7ba557616067a0b12773ee9
-
SHA512
c9be377b9fc3ec72f9296fc0eb0eddf86c308fd48a065dbe172ae4d16b67a3a20f85ceac545c5150c59b3f0fc8b812e9016650b3e3e6cde5080f85b7afdd183d
-
SSDEEP
24576:s1x4Y79vRMcmZBqkztFhjyDcLrai+hEmWF6:s7469vicSBl8f3E
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-