General
-
Target
2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd
-
Size
927KB
-
Sample
230411-hkn57aba34
-
MD5
782742ae6b3800a49bfac02f3b84829a
-
SHA1
0c72935a2673e21b004108bee065f3c5d5ba6d35
-
SHA256
2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd
-
SHA512
6015ec36626f8629ae462ece0e26c51493bc8baedc5cb2a9d0344ab6e40555422f626fa804798deba8bfc760f976d06a523dcf215ca6c5cae3f3c27f2f9a0328
-
SSDEEP
24576:hyRP7s5/vyE6C4v05/j+ZxjiCZbOM3M4I:UOdyS4vaCvZb7
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Targets
-
-
Target
2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd
-
Size
927KB
-
MD5
782742ae6b3800a49bfac02f3b84829a
-
SHA1
0c72935a2673e21b004108bee065f3c5d5ba6d35
-
SHA256
2338fbe23be18aa48fa9994bc337050b9ea93c6056cd577985a4f539fbdef2fd
-
SHA512
6015ec36626f8629ae462ece0e26c51493bc8baedc5cb2a9d0344ab6e40555422f626fa804798deba8bfc760f976d06a523dcf215ca6c5cae3f3c27f2f9a0328
-
SSDEEP
24576:hyRP7s5/vyE6C4v05/j+ZxjiCZbOM3M4I:UOdyS4vaCvZb7
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-