General
-
Target
97100882e74c8881b69fe82e4db111dc874fb7d28cb184020cef1f7e6f4e535f
-
Size
896KB
-
Sample
230412-pzphtscc89
-
MD5
9cf55a68eef77b1f1ed2e1755c2558c3
-
SHA1
5103b16f9fe832a060a43374831dc5bb7864513f
-
SHA256
97100882e74c8881b69fe82e4db111dc874fb7d28cb184020cef1f7e6f4e535f
-
SHA512
8e684accb5af1511e37960d522996a4780b629ceeb6dcf8a06f7cede7b320570a41c7233b5e6cf04a105484f070e28693950308598c3974b750699f3ca096f2a
-
SSDEEP
12288:NMrDy907jFGXbvJ1NcFeklsqM5yQslY5JhjmwfSfuB053VX6baw5fQm/MR:2ytOFvl8jSY3swKfuA3VgN1m
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Targets
-
-
Target
97100882e74c8881b69fe82e4db111dc874fb7d28cb184020cef1f7e6f4e535f
-
Size
896KB
-
MD5
9cf55a68eef77b1f1ed2e1755c2558c3
-
SHA1
5103b16f9fe832a060a43374831dc5bb7864513f
-
SHA256
97100882e74c8881b69fe82e4db111dc874fb7d28cb184020cef1f7e6f4e535f
-
SHA512
8e684accb5af1511e37960d522996a4780b629ceeb6dcf8a06f7cede7b320570a41c7233b5e6cf04a105484f070e28693950308598c3974b750699f3ca096f2a
-
SSDEEP
12288:NMrDy907jFGXbvJ1NcFeklsqM5yQslY5JhjmwfSfuB053VX6baw5fQm/MR:2ytOFvl8jSY3swKfuA3VgN1m
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-