General
-
Target
b505c3cb6e0f3382a5ff7e0e9693809dc518a5c066805497e40cb130fbd29fec
-
Size
801KB
-
Sample
230410-zdm3zshf7t
-
MD5
e0204dcaac928447088271cf2745da48
-
SHA1
0e85b168bc6264f800d8a603ec3c4b376e10791b
-
SHA256
b505c3cb6e0f3382a5ff7e0e9693809dc518a5c066805497e40cb130fbd29fec
-
SHA512
ad240bf46a3f4b8a88f43bebb2f2cd19836cd54b8d0cdf43f70372a4c8766e2aafb2a1c23a54d18bb060f3e08b4ab708cb0c39898c578eaeff91401a91174097
-
SSDEEP
12288:1Mrry902SC2U9xVi7aRmeesqu1NrYxK7CyQll5POl1EL7UHiNUVxLiWCmZbu3b8D:2ypSCB9xViWUJsqu1NcxfB7fU9o7wD
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
zima
176.113.115.145:4125
-
auth_value
2ef701d510c0d27e8a8e3270281678b1
Targets
-
-
Target
b505c3cb6e0f3382a5ff7e0e9693809dc518a5c066805497e40cb130fbd29fec
-
Size
801KB
-
MD5
e0204dcaac928447088271cf2745da48
-
SHA1
0e85b168bc6264f800d8a603ec3c4b376e10791b
-
SHA256
b505c3cb6e0f3382a5ff7e0e9693809dc518a5c066805497e40cb130fbd29fec
-
SHA512
ad240bf46a3f4b8a88f43bebb2f2cd19836cd54b8d0cdf43f70372a4c8766e2aafb2a1c23a54d18bb060f3e08b4ab708cb0c39898c578eaeff91401a91174097
-
SSDEEP
12288:1Mrry902SC2U9xVi7aRmeesqu1NrYxK7CyQll5POl1EL7UHiNUVxLiWCmZbu3b8D:2ypSCB9xViWUJsqu1NcxfB7fU9o7wD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-