General
-
Target
eed9c9be12c6881571abe3c3518cc1fc897765683f80f62ecd6b7c5fac764ec5
-
Size
1.1MB
-
Sample
230413-fq2x5aah9z
-
MD5
ee6834f76a6377317ad927d4e510207a
-
SHA1
3f077befd45b80a785e01a8ac310982abd9bec05
-
SHA256
eed9c9be12c6881571abe3c3518cc1fc897765683f80f62ecd6b7c5fac764ec5
-
SHA512
c993e229b7e0c92065f0fa31e2502a1bf841836fec667a55cbd1989d509fa85c725ae8d627a9dfee9a59e9aec5d83d3c4916497593550417faf4237147002ea2
-
SSDEEP
24576:PyCIuvSqk7/BH335lX/f5q7XRz/o8qBIe1Ix/i/RPp:aCIuZE/Bn51f07X1AJUi/
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
eed9c9be12c6881571abe3c3518cc1fc897765683f80f62ecd6b7c5fac764ec5
-
Size
1.1MB
-
MD5
ee6834f76a6377317ad927d4e510207a
-
SHA1
3f077befd45b80a785e01a8ac310982abd9bec05
-
SHA256
eed9c9be12c6881571abe3c3518cc1fc897765683f80f62ecd6b7c5fac764ec5
-
SHA512
c993e229b7e0c92065f0fa31e2502a1bf841836fec667a55cbd1989d509fa85c725ae8d627a9dfee9a59e9aec5d83d3c4916497593550417faf4237147002ea2
-
SSDEEP
24576:PyCIuvSqk7/BH335lX/f5q7XRz/o8qBIe1Ix/i/RPp:aCIuZE/Bn51f07X1AJUi/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-