General
-
Target
02c19b8c8bebc3b394f0453d472e3065c9c8cdd3281062f02380eedd171e2d4d
-
Size
1.1MB
-
Sample
230412-kmncsabb27
-
MD5
8b8504192697c271ea6dfee38f0ff894
-
SHA1
d7911ae20760be6d5348245508b8276481868ff3
-
SHA256
02c19b8c8bebc3b394f0453d472e3065c9c8cdd3281062f02380eedd171e2d4d
-
SHA512
b56b512f80405ad34944ecd7a20ea5b0e826b247b20e009bf4a15dbaaf800836298f46635418e43dbd3df0f1a08da280b912ce3dd4a1d567eec059b2e979d7ff
-
SSDEEP
24576:2yiwGO+B2XCbvJfTNkVa7hDSKijpAKXE4xWMVJv6h:FqcCbtNkVmhDSlZV
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
02c19b8c8bebc3b394f0453d472e3065c9c8cdd3281062f02380eedd171e2d4d
-
Size
1.1MB
-
MD5
8b8504192697c271ea6dfee38f0ff894
-
SHA1
d7911ae20760be6d5348245508b8276481868ff3
-
SHA256
02c19b8c8bebc3b394f0453d472e3065c9c8cdd3281062f02380eedd171e2d4d
-
SHA512
b56b512f80405ad34944ecd7a20ea5b0e826b247b20e009bf4a15dbaaf800836298f46635418e43dbd3df0f1a08da280b912ce3dd4a1d567eec059b2e979d7ff
-
SSDEEP
24576:2yiwGO+B2XCbvJfTNkVa7hDSKijpAKXE4xWMVJv6h:FqcCbtNkVmhDSlZV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-