General
-
Target
bd36f1a3f48e9f086270504a3fa44b9dacfe8ffc872688cbdb6083a111dc21de
-
Size
1.5MB
-
Sample
230414-qppxaaaa42
-
MD5
fecf974aa12c38e19e994e1d4135c4d1
-
SHA1
a439fe8c08ad83b61e2d94e2a4abc042af05daba
-
SHA256
bd36f1a3f48e9f086270504a3fa44b9dacfe8ffc872688cbdb6083a111dc21de
-
SHA512
c0dd8214001ffa04670539058433135e37a5482472d2751427aaca580ce70086460c83343adb117c872d3f3e4814c359bfbcfa3b14ddabc92ee67c776f8d4645
-
SSDEEP
49152:SBkiXMEyOv8kd6/PIaBG/lBN32erCzRf49+k:trOv83nIlBl2Qu12
Static task
static1
Malware Config
Extracted
redline
soft
77.91.124.146:4121
-
auth_value
e65663e455bca3c5699650b66e76ceaa
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
mars
77.91.124.146:4121
-
auth_value
1c0fd23750a42192aed327b088c4f852
Targets
-
-
Target
bd36f1a3f48e9f086270504a3fa44b9dacfe8ffc872688cbdb6083a111dc21de
-
Size
1.5MB
-
MD5
fecf974aa12c38e19e994e1d4135c4d1
-
SHA1
a439fe8c08ad83b61e2d94e2a4abc042af05daba
-
SHA256
bd36f1a3f48e9f086270504a3fa44b9dacfe8ffc872688cbdb6083a111dc21de
-
SHA512
c0dd8214001ffa04670539058433135e37a5482472d2751427aaca580ce70086460c83343adb117c872d3f3e4814c359bfbcfa3b14ddabc92ee67c776f8d4645
-
SSDEEP
49152:SBkiXMEyOv8kd6/PIaBG/lBN32erCzRf49+k:trOv83nIlBl2Qu12
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-