General
-
Target
6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08
-
Size
801KB
-
Sample
230410-x5gn6shc7t
-
MD5
4a2441ea92ca181c4cf039ef6a1cfa5d
-
SHA1
5ef4cd7ca3c99785d3613e9625fb2349fdcca596
-
SHA256
6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08
-
SHA512
6c7ed523eedbac64eaa8dba600106467c0247535ec972c87a65551a9c4dad674eabbae6dd3d72cb735cf9f835fa3fcd7d2b3db6cf38333074c675da3faf7467c
-
SSDEEP
12288:vMrEy90XLVnJvDDUIR0S7Gi73TWiJAxK7CliYv/TImxzYGwMnmEZDwTw:vyELzvD4exH73CiWxflB7INMnow
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08
-
Size
801KB
-
MD5
4a2441ea92ca181c4cf039ef6a1cfa5d
-
SHA1
5ef4cd7ca3c99785d3613e9625fb2349fdcca596
-
SHA256
6dd21b5c6cf5c9dba7a8d5953695db0db00594e6b1d95228cdf14878f25e2b08
-
SHA512
6c7ed523eedbac64eaa8dba600106467c0247535ec972c87a65551a9c4dad674eabbae6dd3d72cb735cf9f835fa3fcd7d2b3db6cf38333074c675da3faf7467c
-
SSDEEP
12288:vMrEy90XLVnJvDDUIR0S7Gi73TWiJAxK7CliYv/TImxzYGwMnmEZDwTw:vyELzvD4exH73CiWxflB7INMnow
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-