General
-
Target
6b01d7044beb84b4265062fcb2102dbb588408e43c78daf736c8b4041ddba3ce
-
Size
1.0MB
-
Sample
230328-j7q4qshg77
-
MD5
3e95f87895f39e0a06c2871c980cf86c
-
SHA1
64e3a7b7e6cead9ff53d02437628d0f34407a5db
-
SHA256
6b01d7044beb84b4265062fcb2102dbb588408e43c78daf736c8b4041ddba3ce
-
SHA512
5b072dc26840ce61cd0a4a502f32d8ab343ff8a7feff09f5bc23f3a16c24ff37eecfcccbc205ca3fc784ff78a46938d6183af93597a87231561725589108d811
-
SSDEEP
12288:1MrUy90dx9U/7q9xRjkE76WiUlHhIC02jbKSeUWQ8XJCVdiSZKmYL3zulb39adqp:dyimqXoEOZg+nUbzy8i7mYLC539CwJL
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
renta
176.113.115.145:4125
-
auth_value
359596fd5b36e9925ade4d9a1846bafb
Extracted
amadey
3.68
31.41.244.200/games/category/index.php
Targets
-
-
Target
6b01d7044beb84b4265062fcb2102dbb588408e43c78daf736c8b4041ddba3ce
-
Size
1.0MB
-
MD5
3e95f87895f39e0a06c2871c980cf86c
-
SHA1
64e3a7b7e6cead9ff53d02437628d0f34407a5db
-
SHA256
6b01d7044beb84b4265062fcb2102dbb588408e43c78daf736c8b4041ddba3ce
-
SHA512
5b072dc26840ce61cd0a4a502f32d8ab343ff8a7feff09f5bc23f3a16c24ff37eecfcccbc205ca3fc784ff78a46938d6183af93597a87231561725589108d811
-
SSDEEP
12288:1MrUy90dx9U/7q9xRjkE76WiUlHhIC02jbKSeUWQ8XJCVdiSZKmYL3zulb39adqp:dyimqXoEOZg+nUbzy8i7mYLC539CwJL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-