General
-
Target
7f5fac8cb2bb9525318ed9cce9cae09d833e7916403b1fcaf9b1e49578c4a0d1
-
Size
844KB
-
Sample
230411-nlhmpadg61
-
MD5
17e782ef87fb204b47a5584ff5cb6e42
-
SHA1
cd76dc550d34fdd7889cae3783a222525bb7ffc2
-
SHA256
7f5fac8cb2bb9525318ed9cce9cae09d833e7916403b1fcaf9b1e49578c4a0d1
-
SHA512
c5e50530a6a3badd9cde5c1d32153324070e25f3733f942fe3c3aed3d16102db66cc8b5caae472ccb6e7f8c214bbc0c8dc56e1b3e7b61dc40abc9752faf44150
-
SSDEEP
24576:cylW+f6/DZ6VCSiearJ0nIiN087jjq6I:LC7Z6aep1P
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Targets
-
-
Target
7f5fac8cb2bb9525318ed9cce9cae09d833e7916403b1fcaf9b1e49578c4a0d1
-
Size
844KB
-
MD5
17e782ef87fb204b47a5584ff5cb6e42
-
SHA1
cd76dc550d34fdd7889cae3783a222525bb7ffc2
-
SHA256
7f5fac8cb2bb9525318ed9cce9cae09d833e7916403b1fcaf9b1e49578c4a0d1
-
SHA512
c5e50530a6a3badd9cde5c1d32153324070e25f3733f942fe3c3aed3d16102db66cc8b5caae472ccb6e7f8c214bbc0c8dc56e1b3e7b61dc40abc9752faf44150
-
SSDEEP
24576:cylW+f6/DZ6VCSiearJ0nIiN087jjq6I:LC7Z6aep1P
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-