General
-
Target
f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e
-
Size
940KB
-
Sample
230410-x2p65shc6v
-
MD5
c7aadcffaa200937e8f3c77866403f3a
-
SHA1
6bbf989ca68666115a9bd3902a5f413e2b90e04f
-
SHA256
f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e
-
SHA512
107719e748f7e4f10ccdd6dff64406d0c7df5ef8b8683267dd39cf699d6e6c446b4a42b0c849847b270fceb28ee4c1f713e5dacc023a2799e973e5a72e189c24
-
SSDEEP
24576:WyxjsFtpOA9OwV0yLG4yyGTSIhDh2Ow00A8jW4Fo2e:lxqtKyLRyybr0AiC1
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e
-
Size
940KB
-
MD5
c7aadcffaa200937e8f3c77866403f3a
-
SHA1
6bbf989ca68666115a9bd3902a5f413e2b90e04f
-
SHA256
f0ac451ae696fe01e06fb7efb64d19e700e225217cbad59858a14b9e52d9573e
-
SHA512
107719e748f7e4f10ccdd6dff64406d0c7df5ef8b8683267dd39cf699d6e6c446b4a42b0c849847b270fceb28ee4c1f713e5dacc023a2799e973e5a72e189c24
-
SSDEEP
24576:WyxjsFtpOA9OwV0yLG4yyGTSIhDh2Ow00A8jW4Fo2e:lxqtKyLRyybr0AiC1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-