General
-
Target
58a66bfe0564bf4b626a1ec29cfcc4240da22846f7dde42c532c15b85f224779
-
Size
1.0MB
-
Sample
230327-zezheahb71
-
MD5
3eca96c3f33c4c4661aa425d7df01b82
-
SHA1
3e7c44a6bc49f6f819e0e9589d5321983673205a
-
SHA256
58a66bfe0564bf4b626a1ec29cfcc4240da22846f7dde42c532c15b85f224779
-
SHA512
6fe2c89207e61daf402762789576603ddfc6659d6ac00ff8e758691dd9d9a568d1bb658070973989e74b290e655ab7acc47197c6c54acb95ef186c754de619f6
-
SSDEEP
24576:xy+3B/z6DjC6rUwpKhQGwnpK2k7+ElYkU:k2AYHh2pKt7
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
renta
176.113.115.145:4125
-
auth_value
359596fd5b36e9925ade4d9a1846bafb
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
58a66bfe0564bf4b626a1ec29cfcc4240da22846f7dde42c532c15b85f224779
-
Size
1.0MB
-
MD5
3eca96c3f33c4c4661aa425d7df01b82
-
SHA1
3e7c44a6bc49f6f819e0e9589d5321983673205a
-
SHA256
58a66bfe0564bf4b626a1ec29cfcc4240da22846f7dde42c532c15b85f224779
-
SHA512
6fe2c89207e61daf402762789576603ddfc6659d6ac00ff8e758691dd9d9a568d1bb658070973989e74b290e655ab7acc47197c6c54acb95ef186c754de619f6
-
SSDEEP
24576:xy+3B/z6DjC6rUwpKhQGwnpK2k7+ElYkU:k2AYHh2pKt7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-