General
-
Target
2cd570f5f91930f8afe5f08a13a7c0f5aa4fc5ced864f7c43ab0780af4ab5336
-
Size
962KB
-
Sample
230413-1c8tqsed74
-
MD5
a24818dee72ddda78159f248d65b4ad1
-
SHA1
873839324b61eadc6f70d9527687750a6603721e
-
SHA256
2cd570f5f91930f8afe5f08a13a7c0f5aa4fc5ced864f7c43ab0780af4ab5336
-
SHA512
497a09d898db19fd46d377aa5d9aa5875004e9b237ef9363de681e860a3eb8e203d0d7dc381d92a38ff90d61cdb40bf2159ef043ca1b6f06b9a2c4b88f2fb79f
-
SSDEEP
12288:NMrVy90eBxj9eGu6JgrWei+SUdCQee/CdBfS7qoZvcL1Fj4HGd1uNdI/61VGwS40:kyHBx54WCSCCQe8CWrUjJd1uXl4w7g
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
2cd570f5f91930f8afe5f08a13a7c0f5aa4fc5ced864f7c43ab0780af4ab5336
-
Size
962KB
-
MD5
a24818dee72ddda78159f248d65b4ad1
-
SHA1
873839324b61eadc6f70d9527687750a6603721e
-
SHA256
2cd570f5f91930f8afe5f08a13a7c0f5aa4fc5ced864f7c43ab0780af4ab5336
-
SHA512
497a09d898db19fd46d377aa5d9aa5875004e9b237ef9363de681e860a3eb8e203d0d7dc381d92a38ff90d61cdb40bf2159ef043ca1b6f06b9a2c4b88f2fb79f
-
SSDEEP
12288:NMrVy90eBxj9eGu6JgrWei+SUdCQee/CdBfS7qoZvcL1Fj4HGd1uNdI/61VGwS40:kyHBx54WCSCCQe8CWrUjJd1uXl4w7g
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-