General
-
Target
99517b2aac4a085f6d50fe3d0a2891ee6bd384281a51e2df62151e126ab11748
-
Size
1009KB
-
Sample
230402-qcxrcsgd76
-
MD5
c335fb60ad822ccf450719ec139888a1
-
SHA1
c93ac27e05546c544eae7f919922c1614ead4df7
-
SHA256
99517b2aac4a085f6d50fe3d0a2891ee6bd384281a51e2df62151e126ab11748
-
SHA512
02ae86fe5f00f723b99ebf2132e11601e98ff21bffa33304e1e11ec5c4b40f1ddcb1c6bb6ebb067c4ff270706ff5b7dfda2d5cde80787475c6ed6ef16b16009e
-
SSDEEP
24576:ey4iFpS3EW8qpRjgn3eVPascjuPvrfKukQrR919nEZQ:t4iFpS3h9pNamisc+DKukQrdVC
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nord
176.113.115.145:4125
-
auth_value
ebb7d38cdbd7c83cf6363ef3feb3a530
Extracted
amadey
3.69
193.233.20.29/games/category/index.php
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
99517b2aac4a085f6d50fe3d0a2891ee6bd384281a51e2df62151e126ab11748
-
Size
1009KB
-
MD5
c335fb60ad822ccf450719ec139888a1
-
SHA1
c93ac27e05546c544eae7f919922c1614ead4df7
-
SHA256
99517b2aac4a085f6d50fe3d0a2891ee6bd384281a51e2df62151e126ab11748
-
SHA512
02ae86fe5f00f723b99ebf2132e11601e98ff21bffa33304e1e11ec5c4b40f1ddcb1c6bb6ebb067c4ff270706ff5b7dfda2d5cde80787475c6ed6ef16b16009e
-
SSDEEP
24576:ey4iFpS3EW8qpRjgn3eVPascjuPvrfKukQrR919nEZQ:t4iFpS3h9pNamisc+DKukQrdVC
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-