General
-
Target
d95f0092407398c6477ea4d552c97d8ed023a52b223b4e36aa400a06a2373142
-
Size
1.1MB
-
Sample
230412-l2ws5sbd98
-
MD5
ebb679d9bb34126a6fb94655ac244230
-
SHA1
920dbab3cc6fac28d2f0ba7ccf3056767f0c9a08
-
SHA256
d95f0092407398c6477ea4d552c97d8ed023a52b223b4e36aa400a06a2373142
-
SHA512
9d5fe3f216e2c431fea4780ac09a36ac1874a2074d86b9c10197947f9e353963325b1859a6a5dfdee4a574b27ada2e578a27cb8fb17bb6ad56ed0c3ed320660c
-
SSDEEP
24576:CyGkaZ6ee8GBIfI27soTHWHp+OOfdCSxYLZ7TC:pbG6OdhTT6pFSx4d
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
d95f0092407398c6477ea4d552c97d8ed023a52b223b4e36aa400a06a2373142
-
Size
1.1MB
-
MD5
ebb679d9bb34126a6fb94655ac244230
-
SHA1
920dbab3cc6fac28d2f0ba7ccf3056767f0c9a08
-
SHA256
d95f0092407398c6477ea4d552c97d8ed023a52b223b4e36aa400a06a2373142
-
SHA512
9d5fe3f216e2c431fea4780ac09a36ac1874a2074d86b9c10197947f9e353963325b1859a6a5dfdee4a574b27ada2e578a27cb8fb17bb6ad56ed0c3ed320660c
-
SSDEEP
24576:CyGkaZ6ee8GBIfI27soTHWHp+OOfdCSxYLZ7TC:pbG6OdhTT6pFSx4d
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-