General
-
Target
86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b
-
Size
936KB
-
Sample
230410-xks7gafe74
-
MD5
6cd802ee715041d2eb0449c7556dae12
-
SHA1
90d0e32a252a2839f47cf9d404b978de078dfc43
-
SHA256
86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b
-
SHA512
0461c7e564a5dd948e43b99695c37506ec77e40bdc06e26c25c0e6d96612961577d7101ec1a66e2a836d5e9bf452eb1e007232154f9663fc244b5a2d1c260afc
-
SSDEEP
12288:RMrBy90sfxCCv9hHUgMJAZhAWucX3RaEzOidQIuu8u6xbsJp2vygxa5Fgv2HfK8R:wyxfv9hUAXucnRaEzOilgD1+DDNPz
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b
-
Size
936KB
-
MD5
6cd802ee715041d2eb0449c7556dae12
-
SHA1
90d0e32a252a2839f47cf9d404b978de078dfc43
-
SHA256
86ccce71d1b4a78603a6d9f95db9a7ce85efb757309db3bbe8519391dd0bf57b
-
SHA512
0461c7e564a5dd948e43b99695c37506ec77e40bdc06e26c25c0e6d96612961577d7101ec1a66e2a836d5e9bf452eb1e007232154f9663fc244b5a2d1c260afc
-
SSDEEP
12288:RMrBy90sfxCCv9hHUgMJAZhAWucX3RaEzOidQIuu8u6xbsJp2vygxa5Fgv2HfK8R:wyxfv9hUAXucnRaEzOilgD1+DDNPz
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-