General
-
Target
ac7d3e0607e87d351796859314065a4b6cfab15a659a5c3004976f201b750434
-
Size
1.1MB
-
Sample
230412-v1d2dafc4y
-
MD5
44ceaae676290f3178dd3896dd554f5a
-
SHA1
f516c289b6b24ac76908a084511f640a88e1e96d
-
SHA256
ac7d3e0607e87d351796859314065a4b6cfab15a659a5c3004976f201b750434
-
SHA512
e83938ed0660dab0d8bdaa7509020e40ea0abeae28ed4ae22c4e300f41ba17b026705f1963685314900815694c948bc8346faf50c0accd0b06beefaaf7534851
-
SSDEEP
24576:Yyn9HfBOkT3fwmCj277clyOCFpGHv//N9+ap1EYZ76JRr1mfa1xhR9t1dDHW:fzOkTPfCu7ACXGPN9hPUXYfEzX7j
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
ac7d3e0607e87d351796859314065a4b6cfab15a659a5c3004976f201b750434
-
Size
1.1MB
-
MD5
44ceaae676290f3178dd3896dd554f5a
-
SHA1
f516c289b6b24ac76908a084511f640a88e1e96d
-
SHA256
ac7d3e0607e87d351796859314065a4b6cfab15a659a5c3004976f201b750434
-
SHA512
e83938ed0660dab0d8bdaa7509020e40ea0abeae28ed4ae22c4e300f41ba17b026705f1963685314900815694c948bc8346faf50c0accd0b06beefaaf7534851
-
SSDEEP
24576:Yyn9HfBOkT3fwmCj277clyOCFpGHv//N9+ap1EYZ76JRr1mfa1xhR9t1dDHW:fzOkTPfCu7ACXGPN9hPUXYfEzX7j
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-