General
-
Target
d43b27eacb8dd347790c2531f7f730316a7b9bf082f1b55252388a1b86c5a481
-
Size
1.5MB
-
Sample
230413-c2sbaaab6z
-
MD5
1364b7f0e16d35b0cc10b04fc07a6280
-
SHA1
33630f1bf8ad9a25599dd1ae5a3a373501be71d2
-
SHA256
d43b27eacb8dd347790c2531f7f730316a7b9bf082f1b55252388a1b86c5a481
-
SHA512
8ac5c282e15fe42d123fef39ea1bf2956b28e7bc8325ea9fe7fd0617a36feeff862e8e4fc56652f2537a888a502d47874a69a50eff3da27e049ffeeaa8c893c7
-
SSDEEP
24576:0y6nZ9BhMw4HQV6Hat9iF+K1ptIU4d0hJgilzfm8zCByBLnB85Epl2TrSiheeJXY:DWZGC6wm1ptIU4Pu68MyBDBmEKS+T
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
mari
185.161.248.90:4125
-
auth_value
55a059e2793efc70d441ee368eba8733
Targets
-
-
Target
d43b27eacb8dd347790c2531f7f730316a7b9bf082f1b55252388a1b86c5a481
-
Size
1.5MB
-
MD5
1364b7f0e16d35b0cc10b04fc07a6280
-
SHA1
33630f1bf8ad9a25599dd1ae5a3a373501be71d2
-
SHA256
d43b27eacb8dd347790c2531f7f730316a7b9bf082f1b55252388a1b86c5a481
-
SHA512
8ac5c282e15fe42d123fef39ea1bf2956b28e7bc8325ea9fe7fd0617a36feeff862e8e4fc56652f2537a888a502d47874a69a50eff3da27e049ffeeaa8c893c7
-
SSDEEP
24576:0y6nZ9BhMw4HQV6Hat9iF+K1ptIU4d0hJgilzfm8zCByBLnB85Epl2TrSiheeJXY:DWZGC6wm1ptIU4Pu68MyBDBmEKS+T
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-