General
-
Target
c1d4bc236a66a541331bebbbe325ab6f7079618ff186759735f08f470d7e674d
-
Size
1.1MB
-
Sample
230413-3q76gagd7x
-
MD5
2b43ce34b32aba8e5b5bcae57d06b526
-
SHA1
d98be1d5ddeaf9b3b7f91c925298f1baf5337b6d
-
SHA256
c1d4bc236a66a541331bebbbe325ab6f7079618ff186759735f08f470d7e674d
-
SHA512
e1c6b1fd208369f796a62d0eaf32814757671b5e3135be479e826f27637f6231f285f21ca09ccd3fb5778935a29d024b7e5a32b8bfe872eeccfdc14a4576abfe
-
SSDEEP
24576:6yb0KEBR1dvAufW2FcVj5rMkGYJggdVFcy52Jn4jf5fQ:BbLuR1GufHFcVjqkGAggTWykyB
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
c1d4bc236a66a541331bebbbe325ab6f7079618ff186759735f08f470d7e674d
-
Size
1.1MB
-
MD5
2b43ce34b32aba8e5b5bcae57d06b526
-
SHA1
d98be1d5ddeaf9b3b7f91c925298f1baf5337b6d
-
SHA256
c1d4bc236a66a541331bebbbe325ab6f7079618ff186759735f08f470d7e674d
-
SHA512
e1c6b1fd208369f796a62d0eaf32814757671b5e3135be479e826f27637f6231f285f21ca09ccd3fb5778935a29d024b7e5a32b8bfe872eeccfdc14a4576abfe
-
SSDEEP
24576:6yb0KEBR1dvAufW2FcVj5rMkGYJggdVFcy52Jn4jf5fQ:BbLuR1GufHFcVjqkGAggTWykyB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-