General
-
Target
8bf2a5ea15e7a3cc6c96ccb89615fe5eced93145da7a88776e7781abca687e80
-
Size
1008KB
-
Sample
230324-ng2vrsdh75
-
MD5
1e94efe9fc11c79891474d18eb4960c9
-
SHA1
095bbbe47bcba1b427e114839a24cb646bd891b8
-
SHA256
8bf2a5ea15e7a3cc6c96ccb89615fe5eced93145da7a88776e7781abca687e80
-
SHA512
bb9f99e3c26e319956f32abeabc368de5f473627422cfc72387028c45ba2840b1293df1ce62f84bb58c09a2a29d09b4e166210869dd7ca4beee6da39f067a420
-
SSDEEP
24576:WyLa3KzNiuLpkbRspShgy0u9nICWzLnC9L3K0b:l23KzZLpispShfD9ICWzbCVJ
Static task
static1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
volya
193.233.20.31:4125
-
auth_value
0efc9f002a9fbeec5f8b8338141d546a
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
8bf2a5ea15e7a3cc6c96ccb89615fe5eced93145da7a88776e7781abca687e80
-
Size
1008KB
-
MD5
1e94efe9fc11c79891474d18eb4960c9
-
SHA1
095bbbe47bcba1b427e114839a24cb646bd891b8
-
SHA256
8bf2a5ea15e7a3cc6c96ccb89615fe5eced93145da7a88776e7781abca687e80
-
SHA512
bb9f99e3c26e319956f32abeabc368de5f473627422cfc72387028c45ba2840b1293df1ce62f84bb58c09a2a29d09b4e166210869dd7ca4beee6da39f067a420
-
SSDEEP
24576:WyLa3KzNiuLpkbRspShgy0u9nICWzLnC9L3K0b:l23KzZLpispShfD9ICWzbCVJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-