General
-
Target
82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff
-
Size
800KB
-
Sample
230410-x73z7afg47
-
MD5
e5c327afaad21567e6a4a9cc30661316
-
SHA1
579a662bc621030389c741c1727de66647250c92
-
SHA256
82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff
-
SHA512
4b4ccc0b97f31e1877cfe5474ef9411ec975f02cea72c09e9608f5c3e341a5d840b2b223cd0a932f8016eddf85d9454cce0f6cb3fb5bf2fab4ef9354203ae243
-
SSDEEP
12288:sMrny90thWwyLZC1lTOuJ/owxK7CFeaP86T44e6zBxCtoLkvAf52:jygb1lOMxfkaPJBzBxC+LsY2
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff
-
Size
800KB
-
MD5
e5c327afaad21567e6a4a9cc30661316
-
SHA1
579a662bc621030389c741c1727de66647250c92
-
SHA256
82cc9560423a4a6bff68e0b6eae758ff4f8a538afab8792496a5f83a494960ff
-
SHA512
4b4ccc0b97f31e1877cfe5474ef9411ec975f02cea72c09e9608f5c3e341a5d840b2b223cd0a932f8016eddf85d9454cce0f6cb3fb5bf2fab4ef9354203ae243
-
SSDEEP
12288:sMrny90thWwyLZC1lTOuJ/owxK7CFeaP86T44e6zBxCtoLkvAf52:jygb1lOMxfkaPJBzBxC+LsY2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-