General
-
Target
f3948f88ce106902ca088da446e024e3476cd4e1e12f8d2b0236d0498f4e5546
-
Size
1.1MB
-
Sample
230413-21re2aeh35
-
MD5
6ba9900f6012d7502aa5146b2aed91f6
-
SHA1
cbd3be4d1876d918942f74b92c7f05ccab18e22b
-
SHA256
f3948f88ce106902ca088da446e024e3476cd4e1e12f8d2b0236d0498f4e5546
-
SHA512
a6c00c98ca304f7411821aba419ae6042413e0c616d5b013d839bb6259f0922b7e73790e9d7305d3aac3aeaf2554bfcb74e5732eeff4060b8b869078693a7089
-
SSDEEP
24576:hy3sTFhQTXjdcqrAzt0F+8e82suisy3oKLuchruk:U8TF6TXjSqrMOM8eVitoKLuZ
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
f3948f88ce106902ca088da446e024e3476cd4e1e12f8d2b0236d0498f4e5546
-
Size
1.1MB
-
MD5
6ba9900f6012d7502aa5146b2aed91f6
-
SHA1
cbd3be4d1876d918942f74b92c7f05ccab18e22b
-
SHA256
f3948f88ce106902ca088da446e024e3476cd4e1e12f8d2b0236d0498f4e5546
-
SHA512
a6c00c98ca304f7411821aba419ae6042413e0c616d5b013d839bb6259f0922b7e73790e9d7305d3aac3aeaf2554bfcb74e5732eeff4060b8b869078693a7089
-
SSDEEP
24576:hy3sTFhQTXjdcqrAzt0F+8e82suisy3oKLuchruk:U8TF6TXjSqrMOM8eVitoKLuZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-