General
-
Target
2849d6d4b32da6d6a0c2324f2020e3cc.exe
-
Size
809KB
-
Sample
230412-gakjksbg6y
-
MD5
2849d6d4b32da6d6a0c2324f2020e3cc
-
SHA1
7e9f2207b9758a9f672eb49b3d710a3aefe99018
-
SHA256
746612cb14f766f973c76886b1e6660db463a2cb6b5861b6c0722a7aa7728a32
-
SHA512
756b8d15d5fe4fe91e7c3e22030be33f10c3f5699a5a80d0cf6e5a22758e820431586f8e3a1c5caa4da55827a84c88b05ff1923bdfd251a6a5ad61cd25761218
-
SSDEEP
12288:rMrgy90Yn5Rovoa2xYtACKdH+eoihHddcxyAjwc2GWOS7HvmpaOS:byvngx2SKJEb9ZWO+zr
Static task
static1
Behavioral task
behavioral1
Sample
2849d6d4b32da6d6a0c2324f2020e3cc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2849d6d4b32da6d6a0c2324f2020e3cc.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
2849d6d4b32da6d6a0c2324f2020e3cc.exe
-
Size
809KB
-
MD5
2849d6d4b32da6d6a0c2324f2020e3cc
-
SHA1
7e9f2207b9758a9f672eb49b3d710a3aefe99018
-
SHA256
746612cb14f766f973c76886b1e6660db463a2cb6b5861b6c0722a7aa7728a32
-
SHA512
756b8d15d5fe4fe91e7c3e22030be33f10c3f5699a5a80d0cf6e5a22758e820431586f8e3a1c5caa4da55827a84c88b05ff1923bdfd251a6a5ad61cd25761218
-
SSDEEP
12288:rMrgy90Yn5Rovoa2xYtACKdH+eoihHddcxyAjwc2GWOS7HvmpaOS:byvngx2SKJEb9ZWO+zr
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-