General
-
Target
d9b57dfd9203371a4a49a4de4de825614b6dc0611108fbc09e4443afe4c5e4bc
-
Size
800KB
-
Sample
230410-yfyf3afg88
-
MD5
99ada83c7c009bbdb4fca4c1e8a380c6
-
SHA1
6c759b14cadb59aa0b9b786fbba04f5f5c11c923
-
SHA256
d9b57dfd9203371a4a49a4de4de825614b6dc0611108fbc09e4443afe4c5e4bc
-
SHA512
42f6dae1dbfab1ec3c57e9f4db54c39f97feae54447b93b1d9e42216a1870db4218d013a3e10e60c7e83c253c45155df5a2795495f8212792e54446841943013
-
SSDEEP
12288:fMrky90oNOyP3akpyno1+D7xK7CoZgjtagYTkcP8fmsLn1l0H7ip:Xy3YyPakpynbfxfjEyLn1KH7G
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
d9b57dfd9203371a4a49a4de4de825614b6dc0611108fbc09e4443afe4c5e4bc
-
Size
800KB
-
MD5
99ada83c7c009bbdb4fca4c1e8a380c6
-
SHA1
6c759b14cadb59aa0b9b786fbba04f5f5c11c923
-
SHA256
d9b57dfd9203371a4a49a4de4de825614b6dc0611108fbc09e4443afe4c5e4bc
-
SHA512
42f6dae1dbfab1ec3c57e9f4db54c39f97feae54447b93b1d9e42216a1870db4218d013a3e10e60c7e83c253c45155df5a2795495f8212792e54446841943013
-
SSDEEP
12288:fMrky90oNOyP3akpyno1+D7xK7CoZgjtagYTkcP8fmsLn1l0H7ip:Xy3YyPakpynbfxfjEyLn1KH7G
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-