General
-
Target
f80533153d08d97597c09d5cb522a5dff6092a6259c13f31bdb56bb91207a8fb
-
Size
1005KB
-
Sample
230328-bnst8agc29
-
MD5
9d78afead148834502cfe7f8d704cba3
-
SHA1
9c90a9c8e58a992ec614ca80f2e6677aab257393
-
SHA256
f80533153d08d97597c09d5cb522a5dff6092a6259c13f31bdb56bb91207a8fb
-
SHA512
072f57a2f96df4232f9190b5b95287e603dd33d85757419169104da0adbb075193a8dcf7826180272f5dc95096c8efc00b476cb9f32bb16a76316b81d0d76e63
-
SSDEEP
24576:VyOkRmf3hP7CTNGQVra2uOaZ3+2kmHuycmJVxHQag1ujUan84KD+D:wZINdQVm2VaZ3bkhycmhkIAaP0+
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
renta
176.113.115.145:4125
-
auth_value
359596fd5b36e9925ade4d9a1846bafb
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
f80533153d08d97597c09d5cb522a5dff6092a6259c13f31bdb56bb91207a8fb
-
Size
1005KB
-
MD5
9d78afead148834502cfe7f8d704cba3
-
SHA1
9c90a9c8e58a992ec614ca80f2e6677aab257393
-
SHA256
f80533153d08d97597c09d5cb522a5dff6092a6259c13f31bdb56bb91207a8fb
-
SHA512
072f57a2f96df4232f9190b5b95287e603dd33d85757419169104da0adbb075193a8dcf7826180272f5dc95096c8efc00b476cb9f32bb16a76316b81d0d76e63
-
SSDEEP
24576:VyOkRmf3hP7CTNGQVra2uOaZ3+2kmHuycmJVxHQag1ujUan84KD+D:wZINdQVm2VaZ3bkhycmhkIAaP0+
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-