General
-
Target
c62be72770a460f944c36354019992a6860a915fc54a194e7582ddb5587f5653
-
Size
1005KB
-
Sample
230402-zmy7lsaf23
-
MD5
ab06f4f48799c4285d4705a044126b29
-
SHA1
817e21acd8ce5a4eb07530eefe942bfe8ea3231a
-
SHA256
c62be72770a460f944c36354019992a6860a915fc54a194e7582ddb5587f5653
-
SHA512
9da099550989ccc3ad3becc22797f7f144b32ae826a069f5f355caf8d6c09cc613d62abf4dbaf5c979cec2f3e322fd5ce4c6e25226797157e755e9204f41cebe
-
SSDEEP
24576:iyeUvWpYvL/EzyoQkzfQNAw41/2DLbi/n:JeRmLOQkzfkB4Nabi/
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nord
176.113.115.145:4125
-
auth_value
ebb7d38cdbd7c83cf6363ef3feb3a530
Extracted
amadey
3.69
193.233.20.29/games/category/index.php
Targets
-
-
Target
c62be72770a460f944c36354019992a6860a915fc54a194e7582ddb5587f5653
-
Size
1005KB
-
MD5
ab06f4f48799c4285d4705a044126b29
-
SHA1
817e21acd8ce5a4eb07530eefe942bfe8ea3231a
-
SHA256
c62be72770a460f944c36354019992a6860a915fc54a194e7582ddb5587f5653
-
SHA512
9da099550989ccc3ad3becc22797f7f144b32ae826a069f5f355caf8d6c09cc613d62abf4dbaf5c979cec2f3e322fd5ce4c6e25226797157e755e9204f41cebe
-
SSDEEP
24576:iyeUvWpYvL/EzyoQkzfQNAw41/2DLbi/n:JeRmLOQkzfkB4Nabi/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-