General
-
Target
39ed8e8dd028533bc42b810ed35020d7ab94d33ac2463e3e984e9da64f75a8f7
-
Size
1.0MB
-
Sample
230410-x4a51aff96
-
MD5
4dd91c6b91f4af0efb128ef9fd8ec008
-
SHA1
048962b927d4da4bdfb0b915938502845906f30a
-
SHA256
39ed8e8dd028533bc42b810ed35020d7ab94d33ac2463e3e984e9da64f75a8f7
-
SHA512
961f85c0c703adf3db65ba1b16b15f089ee2cd4ef50c8561cd13831da26fd08062daa82d744dba6d66d1e317f3c61c5dcad8749590dc7322b2396cead1b94a62
-
SSDEEP
24576:6y46U3CYFIAC8ZvcbeXuMWMJ5C7h0xfPz0kcS5vQ:BFhYyACgcbe+MfJ5Ct0xngkcS5v
Static task
static1
Malware Config
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
brat
176.113.115.145:4125
-
auth_value
1f9c658aed2f70f42f99a57a005561cf
Targets
-
-
Target
39ed8e8dd028533bc42b810ed35020d7ab94d33ac2463e3e984e9da64f75a8f7
-
Size
1.0MB
-
MD5
4dd91c6b91f4af0efb128ef9fd8ec008
-
SHA1
048962b927d4da4bdfb0b915938502845906f30a
-
SHA256
39ed8e8dd028533bc42b810ed35020d7ab94d33ac2463e3e984e9da64f75a8f7
-
SHA512
961f85c0c703adf3db65ba1b16b15f089ee2cd4ef50c8561cd13831da26fd08062daa82d744dba6d66d1e317f3c61c5dcad8749590dc7322b2396cead1b94a62
-
SSDEEP
24576:6y46U3CYFIAC8ZvcbeXuMWMJ5C7h0xfPz0kcS5vQ:BFhYyACgcbe+MfJ5Ct0xngkcS5v
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-