General
-
Target
542c8c012db265399492cc7fb37fce38f69e83d565feb4d4f68bfc7e53f3726d
-
Size
843KB
-
Sample
230411-n6bpwadh9v
-
MD5
39ce2886e2288b4769c1c8644aa81b2f
-
SHA1
c4c4bc7e7f416624dfd64d948c3b2e1271294984
-
SHA256
542c8c012db265399492cc7fb37fce38f69e83d565feb4d4f68bfc7e53f3726d
-
SHA512
22312adc3f824a9f36254c389862c0d92a763d0ac846bf44253e82627583215fb61be0768c3fc6989e2e358b135cd039946d1c2460cce4ed6441fae2ca562ce5
-
SSDEEP
12288:aMrzy903u7eClfsM5T9DjVnRsM1AAzIpWSOzcC7PqKCD/xNeJD00hgAEm1OaJdhv:5yr6yfsMnhnCM1gtlD5NUDPomcadJ7L
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Targets
-
-
Target
542c8c012db265399492cc7fb37fce38f69e83d565feb4d4f68bfc7e53f3726d
-
Size
843KB
-
MD5
39ce2886e2288b4769c1c8644aa81b2f
-
SHA1
c4c4bc7e7f416624dfd64d948c3b2e1271294984
-
SHA256
542c8c012db265399492cc7fb37fce38f69e83d565feb4d4f68bfc7e53f3726d
-
SHA512
22312adc3f824a9f36254c389862c0d92a763d0ac846bf44253e82627583215fb61be0768c3fc6989e2e358b135cd039946d1c2460cce4ed6441fae2ca562ce5
-
SSDEEP
12288:aMrzy903u7eClfsM5T9DjVnRsM1AAzIpWSOzcC7PqKCD/xNeJD00hgAEm1OaJdhv:5yr6yfsMnhnCM1gtlD5NUDPomcadJ7L
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-