General
-
Target
d6ffaef897a3b0d3e6a1850252f4d3d12d178d48cdc588e7ac3fa5d468fee53d
-
Size
975KB
-
Sample
230403-ptk88agc8s
-
MD5
d406cfd6779cbd3f7c8e849a9258ee9c
-
SHA1
602b89078131cf64ef1353aafca0fc83b1409340
-
SHA256
d6ffaef897a3b0d3e6a1850252f4d3d12d178d48cdc588e7ac3fa5d468fee53d
-
SHA512
e04e45db383085e80ae1c3adc1ec132dc4e8008984caa8d8b68fd857e3266e00217c973dfeb6c2299f8b1bfe9ca0b036015c47b22a0a21375d656d1f5103c187
-
SSDEEP
12288:BMr7y90kzE29te1PVk5WMNuH25Xzbs48DosUvhxcNTWzjTx06vio/Yv5rk2i46Pt:aybzE29kg5Y2BsdSkpWzvaoAK2idjp
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nord
176.113.115.145:4125
-
auth_value
ebb7d38cdbd7c83cf6363ef3feb3a530
Extracted
amadey
3.69
193.233.20.29/games/category/index.php
Targets
-
-
Target
d6ffaef897a3b0d3e6a1850252f4d3d12d178d48cdc588e7ac3fa5d468fee53d
-
Size
975KB
-
MD5
d406cfd6779cbd3f7c8e849a9258ee9c
-
SHA1
602b89078131cf64ef1353aafca0fc83b1409340
-
SHA256
d6ffaef897a3b0d3e6a1850252f4d3d12d178d48cdc588e7ac3fa5d468fee53d
-
SHA512
e04e45db383085e80ae1c3adc1ec132dc4e8008984caa8d8b68fd857e3266e00217c973dfeb6c2299f8b1bfe9ca0b036015c47b22a0a21375d656d1f5103c187
-
SSDEEP
12288:BMr7y90kzE29te1PVk5WMNuH25Xzbs48DosUvhxcNTWzjTx06vio/Yv5rk2i46Pt:aybzE29kg5Y2BsdSkpWzvaoAK2idjp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-