General
-
Target
63ccf62505c1cdd3fdd61ac5eb478a2f77df5f380c4c6c31872ae371b8f2bc4c
-
Size
1.0MB
-
Sample
230413-aa1r8sgb54
-
MD5
38bf1b8c56b7ab6a983b28d99ddebbb8
-
SHA1
0f26755f0be8e1ac7e9a8bec12e2c9feebd73744
-
SHA256
63ccf62505c1cdd3fdd61ac5eb478a2f77df5f380c4c6c31872ae371b8f2bc4c
-
SHA512
b1f1001b183ab36b5d23420dfd39bdc4137665b248386b87eab7e3d15eec4659d01a60d0780d7c310518e7ca3fdc7d2b174fc4dc3328b09cb21ebf84e692f83a
-
SSDEEP
24576:gy3R5HMrE2uW4ZfeYE0Bm84CZ/nGUKCzn4DW/B0VDRCZK:n3RpMlXlV8v/GUBi8aVDRCZ
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
63ccf62505c1cdd3fdd61ac5eb478a2f77df5f380c4c6c31872ae371b8f2bc4c
-
Size
1.0MB
-
MD5
38bf1b8c56b7ab6a983b28d99ddebbb8
-
SHA1
0f26755f0be8e1ac7e9a8bec12e2c9feebd73744
-
SHA256
63ccf62505c1cdd3fdd61ac5eb478a2f77df5f380c4c6c31872ae371b8f2bc4c
-
SHA512
b1f1001b183ab36b5d23420dfd39bdc4137665b248386b87eab7e3d15eec4659d01a60d0780d7c310518e7ca3fdc7d2b174fc4dc3328b09cb21ebf84e692f83a
-
SSDEEP
24576:gy3R5HMrE2uW4ZfeYE0Bm84CZ/nGUKCzn4DW/B0VDRCZK:n3RpMlXlV8v/GUBi8aVDRCZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-