General
-
Target
44ca9a17606e736153bf781a47405327d828c2a0a821808e3f5f164f422e7484
-
Size
843KB
-
Sample
230411-ndfs5adg31
-
MD5
c6ae2a824a54e73b273c376574a67ea4
-
SHA1
229454269af44c6114c4bf514bd69a89848dd0ea
-
SHA256
44ca9a17606e736153bf781a47405327d828c2a0a821808e3f5f164f422e7484
-
SHA512
53775c268222e2fbe942177736d81201097bb806410020ee99b109eea81a86801dc344bd98ef1860c380c9e8af2f8cca194f28fd7fbd0f3250d730dfa4f1e32b
-
SSDEEP
24576:1ysKUyZGOc/iDPQrPuBzqH3OLI27Nj2bJXz:QcH/qPQazLLkb
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Targets
-
-
Target
44ca9a17606e736153bf781a47405327d828c2a0a821808e3f5f164f422e7484
-
Size
843KB
-
MD5
c6ae2a824a54e73b273c376574a67ea4
-
SHA1
229454269af44c6114c4bf514bd69a89848dd0ea
-
SHA256
44ca9a17606e736153bf781a47405327d828c2a0a821808e3f5f164f422e7484
-
SHA512
53775c268222e2fbe942177736d81201097bb806410020ee99b109eea81a86801dc344bd98ef1860c380c9e8af2f8cca194f28fd7fbd0f3250d730dfa4f1e32b
-
SSDEEP
24576:1ysKUyZGOc/iDPQrPuBzqH3OLI27Nj2bJXz:QcH/qPQazLLkb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-