General
-
Target
75f80687340556db30d9a551e5ecb822e74b603e14c36dc977e0246d3e26d2fc
-
Size
1.1MB
-
Sample
230412-mdme8sda9x
-
MD5
6429d1c06363352c4829a45dbb467dbc
-
SHA1
3ea7c178d35734116073c7751fa7da4ff0e22e54
-
SHA256
75f80687340556db30d9a551e5ecb822e74b603e14c36dc977e0246d3e26d2fc
-
SHA512
69600f9651f773c45d910f68e674827ac98f129455b10c5354d1a94e0f38917831ee89dcd3d321aefd8a40e84ebe097fcec0486c32b10479d59d3793ece0c540
-
SSDEEP
24576:oyYSluLyDKZO8wx4W/WcoRkeMBfEeQAbCqtDOYX:vYSxZ864W/W5kPtEeQyCqtO
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
75f80687340556db30d9a551e5ecb822e74b603e14c36dc977e0246d3e26d2fc
-
Size
1.1MB
-
MD5
6429d1c06363352c4829a45dbb467dbc
-
SHA1
3ea7c178d35734116073c7751fa7da4ff0e22e54
-
SHA256
75f80687340556db30d9a551e5ecb822e74b603e14c36dc977e0246d3e26d2fc
-
SHA512
69600f9651f773c45d910f68e674827ac98f129455b10c5354d1a94e0f38917831ee89dcd3d321aefd8a40e84ebe097fcec0486c32b10479d59d3793ece0c540
-
SSDEEP
24576:oyYSluLyDKZO8wx4W/WcoRkeMBfEeQAbCqtDOYX:vYSxZ864W/W5kPtEeQyCqtO
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-