General
-
Target
28af7f6222238f49b11df38b3c77780bed3dc0b07f8b0b91adb7b41f230df840
-
Size
1012KB
-
Sample
230324-kx7jeafd61
-
MD5
93a717f99e5d1677dc552c9f185b4e74
-
SHA1
13f7311092f7507cde4d9b1c5c5d92b425930e09
-
SHA256
28af7f6222238f49b11df38b3c77780bed3dc0b07f8b0b91adb7b41f230df840
-
SHA512
39f19b1c1e3d501bb3b3f42201fb74de6243284826fa8b17144e65e6416756f539d673498a8931f3b5208678c852b2870b8856240de1f6e6be180a63dc8b7555
-
SSDEEP
24576:fyInehrFt+GHMRMNSMc7+ybe+1AM1T0cLbZv:qIehrFt+GHMRMNSMcaGp1AM1T0cJ
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
roxi
193.233.20.31:4125
-
auth_value
9d8be78c896acc3cf8b8a6637a221376
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
28af7f6222238f49b11df38b3c77780bed3dc0b07f8b0b91adb7b41f230df840
-
Size
1012KB
-
MD5
93a717f99e5d1677dc552c9f185b4e74
-
SHA1
13f7311092f7507cde4d9b1c5c5d92b425930e09
-
SHA256
28af7f6222238f49b11df38b3c77780bed3dc0b07f8b0b91adb7b41f230df840
-
SHA512
39f19b1c1e3d501bb3b3f42201fb74de6243284826fa8b17144e65e6416756f539d673498a8931f3b5208678c852b2870b8856240de1f6e6be180a63dc8b7555
-
SSDEEP
24576:fyInehrFt+GHMRMNSMc7+ybe+1AM1T0cLbZv:qIehrFt+GHMRMNSMcaGp1AM1T0cJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-