General
-
Target
3fc9bcf32109bcc65eb2cee8e7af7e54512bde9120c61a48aab59b9d3ef45924
-
Size
800KB
-
Sample
230410-yykypahe7w
-
MD5
aa5298588a2a24ab2a7d654b27a334b7
-
SHA1
9409a393451e08fa485e8f55c5614f3462bf1122
-
SHA256
3fc9bcf32109bcc65eb2cee8e7af7e54512bde9120c61a48aab59b9d3ef45924
-
SHA512
9abf02e182e31559f7d83afc57ff1de7617a2032d8fb0ca56b421dd2321679689bf71cfa7472cfbe08ca0cfd5b5b6a11fa0f0faa26ab2c42ea1753b95da14d5e
-
SSDEEP
12288:CMrqy90fUNHEE6sLZ8rUMo38MBCj2xK7Cv9OcakQZW0UsU8+Ug//+JNrYVAw:kyqAHunoMBixfvdakQnUJ7CIAw
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
3fc9bcf32109bcc65eb2cee8e7af7e54512bde9120c61a48aab59b9d3ef45924
-
Size
800KB
-
MD5
aa5298588a2a24ab2a7d654b27a334b7
-
SHA1
9409a393451e08fa485e8f55c5614f3462bf1122
-
SHA256
3fc9bcf32109bcc65eb2cee8e7af7e54512bde9120c61a48aab59b9d3ef45924
-
SHA512
9abf02e182e31559f7d83afc57ff1de7617a2032d8fb0ca56b421dd2321679689bf71cfa7472cfbe08ca0cfd5b5b6a11fa0f0faa26ab2c42ea1753b95da14d5e
-
SSDEEP
12288:CMrqy90fUNHEE6sLZ8rUMo38MBCj2xK7Cv9OcakQZW0UsU8+Ug//+JNrYVAw:kyqAHunoMBixfvdakQnUJ7CIAw
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-