General
-
Target
9119edf81631b14fb9036ad5020f723fbffe15891dd66361f6924736461cb52c
-
Size
842KB
-
Sample
230411-n3hzsadh7s
-
MD5
04bc2967ec9b67f03624197cb2b5b910
-
SHA1
116270e56d0548feb32fb2c52e8e26bcddafa51f
-
SHA256
9119edf81631b14fb9036ad5020f723fbffe15891dd66361f6924736461cb52c
-
SHA512
24fcb34d28591c7657083c713ce393b6702647a847e787ba5bffd359f3964d22ff3497b29cac4097841367013f7bb322c04bb38229ff0637983e385ade0fdc4b
-
SSDEEP
24576:GyMtI1+37I+vKQRcrc+y1c3jEDm/y82DIAbdW:VUm6EzQerc63jEDmCIAb
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Targets
-
-
Target
9119edf81631b14fb9036ad5020f723fbffe15891dd66361f6924736461cb52c
-
Size
842KB
-
MD5
04bc2967ec9b67f03624197cb2b5b910
-
SHA1
116270e56d0548feb32fb2c52e8e26bcddafa51f
-
SHA256
9119edf81631b14fb9036ad5020f723fbffe15891dd66361f6924736461cb52c
-
SHA512
24fcb34d28591c7657083c713ce393b6702647a847e787ba5bffd359f3964d22ff3497b29cac4097841367013f7bb322c04bb38229ff0637983e385ade0fdc4b
-
SSDEEP
24576:GyMtI1+37I+vKQRcrc+y1c3jEDm/y82DIAbdW:VUm6EzQerc63jEDmCIAb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-