General
-
Target
a1569b29abb3e9c1019c194e365fb81d54620f39031fbe1dbdaf916edfe8eeb1
-
Size
1010KB
-
Sample
230324-ksrbmafd5x
-
MD5
12f6f927f952f9c345466c29a8e77eae
-
SHA1
7e6dba24298f82e0bd4d8a2940bd8325854db8ec
-
SHA256
a1569b29abb3e9c1019c194e365fb81d54620f39031fbe1dbdaf916edfe8eeb1
-
SHA512
9a5e8f0e339c8285405dbfb249cedd417292b6b2013d6ff472d98e3f68919b0d8013b82a28753cf994e74831db55764e6b1c3b60fa025039836e25912ec6e9c0
-
SSDEEP
24576:5ymhmQfFd4zb9prO4uFzwiXx1L9Hm0Agabnd0gWTxoG:sLQfFu9pyZFzwiXx1L9sged0XT
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
roxi
193.233.20.31:4125
-
auth_value
9d8be78c896acc3cf8b8a6637a221376
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
a1569b29abb3e9c1019c194e365fb81d54620f39031fbe1dbdaf916edfe8eeb1
-
Size
1010KB
-
MD5
12f6f927f952f9c345466c29a8e77eae
-
SHA1
7e6dba24298f82e0bd4d8a2940bd8325854db8ec
-
SHA256
a1569b29abb3e9c1019c194e365fb81d54620f39031fbe1dbdaf916edfe8eeb1
-
SHA512
9a5e8f0e339c8285405dbfb249cedd417292b6b2013d6ff472d98e3f68919b0d8013b82a28753cf994e74831db55764e6b1c3b60fa025039836e25912ec6e9c0
-
SSDEEP
24576:5ymhmQfFd4zb9prO4uFzwiXx1L9Hm0Agabnd0gWTxoG:sLQfFu9pyZFzwiXx1L9sged0XT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-