General
-
Target
2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d
-
Size
789KB
-
Sample
230411-fv482scb4y
-
MD5
a339ee9eafce043680533113daf54fca
-
SHA1
b895064373f65c0f36e73b8d26c5064926be2f9f
-
SHA256
2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d
-
SHA512
c6d87b062769399f3242189193a4f796d0d2ac7883c7896ffc1e19c29eace0d8f77136aad1c6bd6f9f535a87e0fced0e7f7f345afffead6d1424e8006f3dbade
-
SSDEEP
12288:XMrYy90YLTTbFd3EGjfYlV394jsKtpE1xH+immmJhOeBmZREtV6fYVrVg4MHXSG1:7ypLTTQmYlPpxHcmKO1DEmfYVvwSe
Static task
static1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nahui
176.113.115.145:4125
-
auth_value
b9ed10946d21e28d58d0c72c535cde6f
Targets
-
-
Target
2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d
-
Size
789KB
-
MD5
a339ee9eafce043680533113daf54fca
-
SHA1
b895064373f65c0f36e73b8d26c5064926be2f9f
-
SHA256
2534691f0d314834348dff300ae5546fb387996dedfe55da906a914ae27cd56d
-
SHA512
c6d87b062769399f3242189193a4f796d0d2ac7883c7896ffc1e19c29eace0d8f77136aad1c6bd6f9f535a87e0fced0e7f7f345afffead6d1424e8006f3dbade
-
SSDEEP
12288:XMrYy90YLTTbFd3EGjfYlV394jsKtpE1xH+immmJhOeBmZREtV6fYVrVg4MHXSG1:7ypLTTQmYlPpxHcmKO1DEmfYVvwSe
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-