General
-
Target
624d94b78b026dc654f27a67d644574982a52a69a4e09babff6186978ac73a30
-
Size
982KB
-
Sample
230411-nhwedaca98
-
MD5
aa798091b16c97caa94654dde5552a55
-
SHA1
772c3ed3ca42dffa227fd886bb6c880db3c140d9
-
SHA256
624d94b78b026dc654f27a67d644574982a52a69a4e09babff6186978ac73a30
-
SHA512
766d0be6f296f2eae9b75221c204aa1071d31d99701e98c5aa150847111028e33e28e70d3df8bf3334453e225f85441b839d61f68440dc3179dc8a591c0070c3
-
SSDEEP
24576:FyhugYh8aZy4aMJCOMg7/kNzVymGdky7VwGfjSs:ghurZySJCL+izEPu
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Extracted
redline
nord
176.113.115.145:4125
-
auth_value
ebb7d38cdbd7c83cf6363ef3feb3a530
Targets
-
-
Target
624d94b78b026dc654f27a67d644574982a52a69a4e09babff6186978ac73a30
-
Size
982KB
-
MD5
aa798091b16c97caa94654dde5552a55
-
SHA1
772c3ed3ca42dffa227fd886bb6c880db3c140d9
-
SHA256
624d94b78b026dc654f27a67d644574982a52a69a4e09babff6186978ac73a30
-
SHA512
766d0be6f296f2eae9b75221c204aa1071d31d99701e98c5aa150847111028e33e28e70d3df8bf3334453e225f85441b839d61f68440dc3179dc8a591c0070c3
-
SSDEEP
24576:FyhugYh8aZy4aMJCOMg7/kNzVymGdky7VwGfjSs:ghurZySJCL+izEPu
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-