General
-
Target
428f9e202682cfb0e39a1ec6ef18b9f9b332743e543c87072ae6009ff7837fb4
-
Size
1.0MB
-
Sample
230327-1k6dksfd65
-
MD5
6126d6e9d5e357c6d0dd55f3f9cfe170
-
SHA1
53034cddbfce6aed84ca1378560da15f659b43de
-
SHA256
428f9e202682cfb0e39a1ec6ef18b9f9b332743e543c87072ae6009ff7837fb4
-
SHA512
7c8ea00387ef6b2fe23528653fabebb6dc421391e4c14e5614a5c6e901af216a316f5d16a595d9c9b26b338b6820c6e70382b126a1eff8744720367e091df8db
-
SSDEEP
24576:/yMBjSChO/dchjU1THG6iGAhI5eC6BIOEZe/Jwp:KajwpHLiGVSBIOE4J
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
renta
176.113.115.145:4125
-
auth_value
359596fd5b36e9925ade4d9a1846bafb
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
428f9e202682cfb0e39a1ec6ef18b9f9b332743e543c87072ae6009ff7837fb4
-
Size
1.0MB
-
MD5
6126d6e9d5e357c6d0dd55f3f9cfe170
-
SHA1
53034cddbfce6aed84ca1378560da15f659b43de
-
SHA256
428f9e202682cfb0e39a1ec6ef18b9f9b332743e543c87072ae6009ff7837fb4
-
SHA512
7c8ea00387ef6b2fe23528653fabebb6dc421391e4c14e5614a5c6e901af216a316f5d16a595d9c9b26b338b6820c6e70382b126a1eff8744720367e091df8db
-
SSDEEP
24576:/yMBjSChO/dchjU1THG6iGAhI5eC6BIOEZe/Jwp:KajwpHLiGVSBIOE4J
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-