General
-
Target
1208c77ce20a6a463e669906c539d98e932f628281cc903a0b93ac0efd4b4c55
-
Size
992KB
-
Sample
230402-mkcjlsfh42
-
MD5
e89796f294d1de59c2ea8b372c0029af
-
SHA1
0d238cb9c22711e23410cde03da290ec20da3df4
-
SHA256
1208c77ce20a6a463e669906c539d98e932f628281cc903a0b93ac0efd4b4c55
-
SHA512
2ab0db404585a9e6a0767dd6629816b3a794107f55e1a85a7e5a68a621ae9b09addb81f8f32079f512325865bb4e64bc349c2ed70e43c9973188deeb4f74e3f8
-
SSDEEP
12288:PMrfy90DNaxcayavX4bpiL++7SEFDwuAbsSsrYEx0kD4j7IzTTxojtecnK16wr22:AyKNi/9Yt+7i65/z6xjnK1PrF9EC
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nord
176.113.115.145:4125
-
auth_value
ebb7d38cdbd7c83cf6363ef3feb3a530
Extracted
amadey
3.69
193.233.20.29/games/category/index.php
Targets
-
-
Target
1208c77ce20a6a463e669906c539d98e932f628281cc903a0b93ac0efd4b4c55
-
Size
992KB
-
MD5
e89796f294d1de59c2ea8b372c0029af
-
SHA1
0d238cb9c22711e23410cde03da290ec20da3df4
-
SHA256
1208c77ce20a6a463e669906c539d98e932f628281cc903a0b93ac0efd4b4c55
-
SHA512
2ab0db404585a9e6a0767dd6629816b3a794107f55e1a85a7e5a68a621ae9b09addb81f8f32079f512325865bb4e64bc349c2ed70e43c9973188deeb4f74e3f8
-
SSDEEP
12288:PMrfy90DNaxcayavX4bpiL++7SEFDwuAbsSsrYEx0kD4j7IzTTxojtecnK16wr22:AyKNi/9Yt+7i65/z6xjnK1PrF9EC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-