General
-
Target
67e932337eea9fbee837906422d729711fb66ab21da15bd6c54a7b9c0dfa4fa3
-
Size
938KB
-
Sample
230410-x4jr5sff98
-
MD5
4090a735483cfa2c6d735983e29e985d
-
SHA1
9f53fd9e1e9e416da156ef7d8be23ec243ae959b
-
SHA256
67e932337eea9fbee837906422d729711fb66ab21da15bd6c54a7b9c0dfa4fa3
-
SHA512
6c0fe3132a9dbba546a0df701c3ebdbfd5987c20b962e0f9681214e7b0111afe5259752e1607d03f8789ab3a688eb332cb32384c59ee197fea1e4ffc1d3e1f2d
-
SSDEEP
24576:DyaRMkQIqPwxpXZ7KvTGuHS+OrRqVGaAI7NBaaZiKKfm:WauNIqgpl+qSS+O1qV8oaaZkf
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
67e932337eea9fbee837906422d729711fb66ab21da15bd6c54a7b9c0dfa4fa3
-
Size
938KB
-
MD5
4090a735483cfa2c6d735983e29e985d
-
SHA1
9f53fd9e1e9e416da156ef7d8be23ec243ae959b
-
SHA256
67e932337eea9fbee837906422d729711fb66ab21da15bd6c54a7b9c0dfa4fa3
-
SHA512
6c0fe3132a9dbba546a0df701c3ebdbfd5987c20b962e0f9681214e7b0111afe5259752e1607d03f8789ab3a688eb332cb32384c59ee197fea1e4ffc1d3e1f2d
-
SSDEEP
24576:DyaRMkQIqPwxpXZ7KvTGuHS+OrRqVGaAI7NBaaZiKKfm:WauNIqgpl+qSS+O1qV8oaaZkf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-