General
-
Target
29e4f6931ae94b79780e85b8b057a27a65cf33edac0503c3fca5b36a60fbfc28
-
Size
1.1MB
-
Sample
230412-nf49habh46
-
MD5
f7da6171dff9a8fdb122a789731f4b9f
-
SHA1
42e4be2b8cc2bfab2be97bd840987724f95d6a90
-
SHA256
29e4f6931ae94b79780e85b8b057a27a65cf33edac0503c3fca5b36a60fbfc28
-
SHA512
a37cb57b6ee3a3d8f2d5e8633e8db1c4dd4a890e7d2dc12d1560938488105f0154a3a5b489e5ffac40dccd6abbd07e7e81038ef6bc7999dbed93163fcbad7cd6
-
SSDEEP
24576:vyOcqK0KgMEtnUozIIb1JzZOxwBtuWzyKo33Y:6Otz/tnU29POqBYWWl
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
29e4f6931ae94b79780e85b8b057a27a65cf33edac0503c3fca5b36a60fbfc28
-
Size
1.1MB
-
MD5
f7da6171dff9a8fdb122a789731f4b9f
-
SHA1
42e4be2b8cc2bfab2be97bd840987724f95d6a90
-
SHA256
29e4f6931ae94b79780e85b8b057a27a65cf33edac0503c3fca5b36a60fbfc28
-
SHA512
a37cb57b6ee3a3d8f2d5e8633e8db1c4dd4a890e7d2dc12d1560938488105f0154a3a5b489e5ffac40dccd6abbd07e7e81038ef6bc7999dbed93163fcbad7cd6
-
SSDEEP
24576:vyOcqK0KgMEtnUozIIb1JzZOxwBtuWzyKo33Y:6Otz/tnU29POqBYWWl
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-