General
-
Target
2f4a88006b393eb7272adeefea13b2399b6a5b7f55f1011140aa5320f42cb599
-
Size
1.2MB
-
Sample
230412-zamcaaeh88
-
MD5
f6cac1874813da974c3a126b24861aeb
-
SHA1
302d2d94a3fdc41920a89e03ebc19b043e9c0ce9
-
SHA256
2f4a88006b393eb7272adeefea13b2399b6a5b7f55f1011140aa5320f42cb599
-
SHA512
281461bdadf0ed85e8d8017db96fba078d400772b66d036be48c9d44aea8d4c6f06e0147eda1afdec89ecb74f2c6db9513f5837c91921fa78f594cd9600b34e1
-
SSDEEP
24576:uyNI/Te5rxkRUkEk/NZ+qdBQ6tv7hxtYOJz:9VrxGU/ozvtv7S
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
2f4a88006b393eb7272adeefea13b2399b6a5b7f55f1011140aa5320f42cb599
-
Size
1.2MB
-
MD5
f6cac1874813da974c3a126b24861aeb
-
SHA1
302d2d94a3fdc41920a89e03ebc19b043e9c0ce9
-
SHA256
2f4a88006b393eb7272adeefea13b2399b6a5b7f55f1011140aa5320f42cb599
-
SHA512
281461bdadf0ed85e8d8017db96fba078d400772b66d036be48c9d44aea8d4c6f06e0147eda1afdec89ecb74f2c6db9513f5837c91921fa78f594cd9600b34e1
-
SSDEEP
24576:uyNI/Te5rxkRUkEk/NZ+qdBQ6tv7hxtYOJz:9VrxGU/ozvtv7S
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-