General
-
Target
e730d7ed85ae230af17eb1995a29b753da36de4f9729e4c46d304b36c6bae3a6
-
Size
800KB
-
Sample
230410-y7eg9shf3y
-
MD5
916109fad7ffe0a4c99ef5104ea1a0d2
-
SHA1
25839f39e0f84c5b7cfa2784a7212f7361a7db3c
-
SHA256
e730d7ed85ae230af17eb1995a29b753da36de4f9729e4c46d304b36c6bae3a6
-
SHA512
2a1d372d3f4956e7c5a4e32cd8fa6fbb7a5c323812b3a5bc8a686f26be8007c4ace11e6096cf182c9d7939b2ffe9f5ca1b6500e46443af465b4598689b9be5eb
-
SSDEEP
12288:jMryy901988zPBt8Lo1qcNMgZySBQ2HxK7CZlguIRY1OfwnXP4abWL:1yC7Bt0sNMSyMQ8xfIvRQOfwnXzbm
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
e730d7ed85ae230af17eb1995a29b753da36de4f9729e4c46d304b36c6bae3a6
-
Size
800KB
-
MD5
916109fad7ffe0a4c99ef5104ea1a0d2
-
SHA1
25839f39e0f84c5b7cfa2784a7212f7361a7db3c
-
SHA256
e730d7ed85ae230af17eb1995a29b753da36de4f9729e4c46d304b36c6bae3a6
-
SHA512
2a1d372d3f4956e7c5a4e32cd8fa6fbb7a5c323812b3a5bc8a686f26be8007c4ace11e6096cf182c9d7939b2ffe9f5ca1b6500e46443af465b4598689b9be5eb
-
SSDEEP
12288:jMryy901988zPBt8Lo1qcNMgZySBQ2HxK7CZlguIRY1OfwnXP4abWL:1yC7Bt0sNMSyMQ8xfIvRQOfwnXzbm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-