General
-
Target
0192d5686ed0511d3e8f9e933275b21eeb4e98d9cdf9dc4d7626399830fa6a94
-
Size
801KB
-
Sample
230410-xkr96shb5v
-
MD5
b0b237c424e30afac8796c70ab3f7d86
-
SHA1
2b81dafb1112035880cce1e6ed42815bb1a60b00
-
SHA256
0192d5686ed0511d3e8f9e933275b21eeb4e98d9cdf9dc4d7626399830fa6a94
-
SHA512
b2f3a476758012a99cbf2d04e5190113442e2cae3a330f3eb78ba0b4273c90b655ab5a8f720b36e15fb62bb090e14906387cfda192e5730f05c4ba96f2d37347
-
SSDEEP
12288:AMrGy90nhP7m72Jwu5Ayrj7D3QoHqyhWMRsCG+S2dzMZ3fD5P5uNPYcIn:WyChTJwuXH5qysnCP2PMNPYcw
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
0192d5686ed0511d3e8f9e933275b21eeb4e98d9cdf9dc4d7626399830fa6a94
-
Size
801KB
-
MD5
b0b237c424e30afac8796c70ab3f7d86
-
SHA1
2b81dafb1112035880cce1e6ed42815bb1a60b00
-
SHA256
0192d5686ed0511d3e8f9e933275b21eeb4e98d9cdf9dc4d7626399830fa6a94
-
SHA512
b2f3a476758012a99cbf2d04e5190113442e2cae3a330f3eb78ba0b4273c90b655ab5a8f720b36e15fb62bb090e14906387cfda192e5730f05c4ba96f2d37347
-
SSDEEP
12288:AMrGy90nhP7m72Jwu5Ayrj7D3QoHqyhWMRsCG+S2dzMZ3fD5P5uNPYcIn:WyChTJwuXH5qysnCP2PMNPYcw
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-