General
-
Target
9a420b4ca46e82f4e678fd4c7527a053d4fea20190902abb2f1a1ad3a6d71cec
-
Size
982KB
-
Sample
230411-m9ckxaca58
-
MD5
611aac14788041652c549b030a9295a4
-
SHA1
9834e6aba8266a427f606075fd9b50d08fca3892
-
SHA256
9a420b4ca46e82f4e678fd4c7527a053d4fea20190902abb2f1a1ad3a6d71cec
-
SHA512
3b10d7f21b0e7fc5df019e48f5b2ba43effc3f9cae7215f5fd61e1ebc30ee0df4963542dca52c2bb0f01238a731284bfcd81dfc94ce20a0336f098e027768fa9
-
SSDEEP
24576:YyEVqYjPwq5/IfWjjgOAq5zy32g1w15ropraTIu6/MI:fEAYjYq5AWjjgO1CYkpM
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Extracted
redline
nord
176.113.115.145:4125
-
auth_value
ebb7d38cdbd7c83cf6363ef3feb3a530
Targets
-
-
Target
9a420b4ca46e82f4e678fd4c7527a053d4fea20190902abb2f1a1ad3a6d71cec
-
Size
982KB
-
MD5
611aac14788041652c549b030a9295a4
-
SHA1
9834e6aba8266a427f606075fd9b50d08fca3892
-
SHA256
9a420b4ca46e82f4e678fd4c7527a053d4fea20190902abb2f1a1ad3a6d71cec
-
SHA512
3b10d7f21b0e7fc5df019e48f5b2ba43effc3f9cae7215f5fd61e1ebc30ee0df4963542dca52c2bb0f01238a731284bfcd81dfc94ce20a0336f098e027768fa9
-
SSDEEP
24576:YyEVqYjPwq5/IfWjjgOAq5zy32g1w15ropraTIu6/MI:fEAYjYq5AWjjgO1CYkpM
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-