General
-
Target
181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57
-
Size
800KB
-
Sample
230410-x1swmsff82
-
MD5
fcaed692a3bcad757e0cf2c60dcb225c
-
SHA1
7cdf18ad87ea4b1f00b92ded14217c1a1f894f37
-
SHA256
181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57
-
SHA512
e70b53a82872ccc5f8815f5b02026a0ffb5620214bbca7efd5cfbb2c40ccb5db805e84ba7ae3b6a2a5742b8c253adffd190be7314fcb56af5035b35396230fef
-
SSDEEP
12288:BMrly90hR6S9WB31pZN/hxiSzboKxK7CjEo38LpFbI635Go6dejhKUCaZCt0p9W:kyqOBlpZzxznFxfjVmZvbUyhKV+z/W
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57
-
Size
800KB
-
MD5
fcaed692a3bcad757e0cf2c60dcb225c
-
SHA1
7cdf18ad87ea4b1f00b92ded14217c1a1f894f37
-
SHA256
181b61ba73d975c0407601272e94c7223d064c80d2e6a15cc12ff07be3657f57
-
SHA512
e70b53a82872ccc5f8815f5b02026a0ffb5620214bbca7efd5cfbb2c40ccb5db805e84ba7ae3b6a2a5742b8c253adffd190be7314fcb56af5035b35396230fef
-
SSDEEP
12288:BMrly90hR6S9WB31pZN/hxiSzboKxK7CjEo38LpFbI635Go6dejhKUCaZCt0p9W:kyqOBlpZzxznFxfjVmZvbUyhKV+z/W
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-