General
-
Target
cb91031738cff89b59ab4f97bb0439c99347658e7b2f759f36cc8a7e99e30f35
-
Size
1.1MB
-
Sample
230412-vyn4kadg49
-
MD5
ce7ca2fa80a29cba013e6243cbd4a4cd
-
SHA1
cc2b136ff78b21e4cec362e86e96da1ecc414661
-
SHA256
cb91031738cff89b59ab4f97bb0439c99347658e7b2f759f36cc8a7e99e30f35
-
SHA512
6d50e086d8023e3bd681e36d363ca24091601d81fa37ff61e4622115cb64b8669209df51910f6bf44e33b000374e4e4a35d0873a640eb93aa6c3198e3c8b772e
-
SSDEEP
24576:Fy5YVn4iQQCYG0ROXLNP+ef16ByyqKtxf9gQRfT6iT:g5NQ/G0RO7NPZmwKtRqQRfTJ
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
cb91031738cff89b59ab4f97bb0439c99347658e7b2f759f36cc8a7e99e30f35
-
Size
1.1MB
-
MD5
ce7ca2fa80a29cba013e6243cbd4a4cd
-
SHA1
cc2b136ff78b21e4cec362e86e96da1ecc414661
-
SHA256
cb91031738cff89b59ab4f97bb0439c99347658e7b2f759f36cc8a7e99e30f35
-
SHA512
6d50e086d8023e3bd681e36d363ca24091601d81fa37ff61e4622115cb64b8669209df51910f6bf44e33b000374e4e4a35d0873a640eb93aa6c3198e3c8b772e
-
SSDEEP
24576:Fy5YVn4iQQCYG0ROXLNP+ef16ByyqKtxf9gQRfT6iT:g5NQ/G0RO7NPZmwKtRqQRfTJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-