General
-
Target
39d56dd27e1b49b42ed317f0acdb9d477b981e59984b12c15f5397815c20a56a
-
Size
801KB
-
Sample
230410-xqbvdafe98
-
MD5
ab77642f3b195c1a6e8a9d9dcb193157
-
SHA1
3047af61828c579d894cda0f0621f73a51b2fede
-
SHA256
39d56dd27e1b49b42ed317f0acdb9d477b981e59984b12c15f5397815c20a56a
-
SHA512
eb7cf939e1bd8f3ab2d3f270b04f16f0707edbb32c72c6d3139dd005d3bd79ff54af1883e4a457c94009736c56b76bb6eb66dc8aa4fa1e471fec1a180ef41a47
-
SSDEEP
12288:mMrYy90nWxp+Mu9SQuh3SeTK41NgjhwPZkcLCZQVdOZbTCePL:SyGWL+B8zhPPQmLCgU/
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
39d56dd27e1b49b42ed317f0acdb9d477b981e59984b12c15f5397815c20a56a
-
Size
801KB
-
MD5
ab77642f3b195c1a6e8a9d9dcb193157
-
SHA1
3047af61828c579d894cda0f0621f73a51b2fede
-
SHA256
39d56dd27e1b49b42ed317f0acdb9d477b981e59984b12c15f5397815c20a56a
-
SHA512
eb7cf939e1bd8f3ab2d3f270b04f16f0707edbb32c72c6d3139dd005d3bd79ff54af1883e4a457c94009736c56b76bb6eb66dc8aa4fa1e471fec1a180ef41a47
-
SSDEEP
12288:mMrYy90nWxp+Mu9SQuh3SeTK41NgjhwPZkcLCZQVdOZbTCePL:SyGWL+B8zhPPQmLCgU/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-