General
-
Target
e6a0b2c7fca4b2c6000e90dafa0c4dcc65877e1b5ea68119a834e687ad1d771f
-
Size
1.0MB
-
Sample
230324-cs32esbf59
-
MD5
b9a9f4c09c0470a7f17130fb960d53aa
-
SHA1
303509d72f38753dd868694973ee4761d20481a3
-
SHA256
e6a0b2c7fca4b2c6000e90dafa0c4dcc65877e1b5ea68119a834e687ad1d771f
-
SHA512
5b51a1c0c483b879d3ba514c2accfc81cc9a7cd5443d77e973278488ddba8044f050a4b0e76a0c1df39a6b0eb6d759c6b9f4d3cf9aa3fe9d32ae81bb66f3c64f
-
SSDEEP
12288:xMrqy90iRByZ6+zqhfRmJfuxjzqjll1X29JEIpr+F2EEX1tZLXqvmyLVKEg+55cp:DyTRByZTeo8dmBioUXHZqXYisjr
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
roxi
193.233.20.31:4125
-
auth_value
9d8be78c896acc3cf8b8a6637a221376
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
e6a0b2c7fca4b2c6000e90dafa0c4dcc65877e1b5ea68119a834e687ad1d771f
-
Size
1.0MB
-
MD5
b9a9f4c09c0470a7f17130fb960d53aa
-
SHA1
303509d72f38753dd868694973ee4761d20481a3
-
SHA256
e6a0b2c7fca4b2c6000e90dafa0c4dcc65877e1b5ea68119a834e687ad1d771f
-
SHA512
5b51a1c0c483b879d3ba514c2accfc81cc9a7cd5443d77e973278488ddba8044f050a4b0e76a0c1df39a6b0eb6d759c6b9f4d3cf9aa3fe9d32ae81bb66f3c64f
-
SSDEEP
12288:xMrqy90iRByZ6+zqhfRmJfuxjzqjll1X29JEIpr+F2EEX1tZLXqvmyLVKEg+55cp:DyTRByZTeo8dmBioUXHZqXYisjr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-