Resubmissions
28/11/2023, 16:39
231128-t57ntabe9x 426/11/2023, 09:59
231126-lz9l8agf38 626/11/2023, 09:34
231126-ljxygsge2y 1026/11/2023, 08:47
231126-kp6l5sga27 1018/11/2023, 13:27
231118-qqjrnaee32 118/11/2023, 12:49
231118-p2nz3sfa5z 815/11/2023, 11:22
231115-ngzemsag9s 1015/11/2023, 10:40
231115-mqx3hafh55 804/11/2023, 09:34
231104-lj5y4agh72 1General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
redline
Botnet
@heis999
C2
45.15.156.167:80
Targets
-
-
Target
https://google.com
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-