General
-
Target
458e3ba35592fec00a34b969c8ac4421c0ffa757db0c4cf20ff7b068e5e28ede
-
Size
1.0MB
-
Sample
230413-b59t3age85
-
MD5
0b52a087b52469dc0199b8286f475d9c
-
SHA1
371573a87d194e18ee809bf19a88b969084ec810
-
SHA256
458e3ba35592fec00a34b969c8ac4421c0ffa757db0c4cf20ff7b068e5e28ede
-
SHA512
159fa2bb0f1bc3207e6073e96ce27c0e441cbe6b45563ab5485d1130b50650a9dd0c63cfe414372c3edf4a9174e4be31ebd130006a8f24c121d168d8562ff63a
-
SSDEEP
24576:/yOUiCponONCV1x4EoPftFHLjm8g9FPix6sHJH:K+konOGrml28eKv
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
458e3ba35592fec00a34b969c8ac4421c0ffa757db0c4cf20ff7b068e5e28ede
-
Size
1.0MB
-
MD5
0b52a087b52469dc0199b8286f475d9c
-
SHA1
371573a87d194e18ee809bf19a88b969084ec810
-
SHA256
458e3ba35592fec00a34b969c8ac4421c0ffa757db0c4cf20ff7b068e5e28ede
-
SHA512
159fa2bb0f1bc3207e6073e96ce27c0e441cbe6b45563ab5485d1130b50650a9dd0c63cfe414372c3edf4a9174e4be31ebd130006a8f24c121d168d8562ff63a
-
SSDEEP
24576:/yOUiCponONCV1x4EoPftFHLjm8g9FPix6sHJH:K+konOGrml28eKv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-