General
-
Target
3c720be6217aa1678b15cee284ece5a4e7b8933d2e9befebba44500e8769dac7
-
Size
1.1MB
-
Sample
230412-wre3raea52
-
MD5
97ea96c93630924e109c39d341beb19b
-
SHA1
07e5931e524f980a7e3d5860396c9e58fb1f8498
-
SHA256
3c720be6217aa1678b15cee284ece5a4e7b8933d2e9befebba44500e8769dac7
-
SHA512
7c878f84a934f9758942abf360605c709566ea0ee12ebbc85f92385103dbfd0ddb216dc0ff223de5e94444fa229070a415c3681799578d1be04118dfc296e452
-
SSDEEP
24576:qyOcJFV5q1IB/vavbNJGEI4U01EGt8t7HTMpHXL5WC22:xOSq1IB/vaDUa27H4JL5Wt
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
3c720be6217aa1678b15cee284ece5a4e7b8933d2e9befebba44500e8769dac7
-
Size
1.1MB
-
MD5
97ea96c93630924e109c39d341beb19b
-
SHA1
07e5931e524f980a7e3d5860396c9e58fb1f8498
-
SHA256
3c720be6217aa1678b15cee284ece5a4e7b8933d2e9befebba44500e8769dac7
-
SHA512
7c878f84a934f9758942abf360605c709566ea0ee12ebbc85f92385103dbfd0ddb216dc0ff223de5e94444fa229070a415c3681799578d1be04118dfc296e452
-
SSDEEP
24576:qyOcJFV5q1IB/vavbNJGEI4U01EGt8t7HTMpHXL5WC22:xOSq1IB/vaDUa27H4JL5Wt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-