General
-
Target
8a94117a77788ab679c5dbcd5b1ae6c29b00a68d5c84611fa1bde2a34f2b59e5
-
Size
1.2MB
-
Sample
230412-fgx8ksaa22
-
MD5
feab25327fd2b3a2709fdcc0192ed761
-
SHA1
b627dad1f238c5676a3743e18771dafc15e841a5
-
SHA256
8a94117a77788ab679c5dbcd5b1ae6c29b00a68d5c84611fa1bde2a34f2b59e5
-
SHA512
a3cdc3e4721e17c622906f01a36475ace5485d614d806adcab5bef27b1863e813ab111385e8ea7dd80b90eedab2fe6a6f445bebb6e63369b646677cac8d08e69
-
SSDEEP
24576:+ykmSpCIF/F4nbi8P+5l/J3Lhwn6hWOZv+7RVbyilgW:NkmywG5l/BdwmWOZviV+i
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
8a94117a77788ab679c5dbcd5b1ae6c29b00a68d5c84611fa1bde2a34f2b59e5
-
Size
1.2MB
-
MD5
feab25327fd2b3a2709fdcc0192ed761
-
SHA1
b627dad1f238c5676a3743e18771dafc15e841a5
-
SHA256
8a94117a77788ab679c5dbcd5b1ae6c29b00a68d5c84611fa1bde2a34f2b59e5
-
SHA512
a3cdc3e4721e17c622906f01a36475ace5485d614d806adcab5bef27b1863e813ab111385e8ea7dd80b90eedab2fe6a6f445bebb6e63369b646677cac8d08e69
-
SSDEEP
24576:+ykmSpCIF/F4nbi8P+5l/J3Lhwn6hWOZv+7RVbyilgW:NkmywG5l/BdwmWOZviV+i
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-