General
-
Target
59fbd8c5d36e07b328ebed8851c6e25e01a9650b5711db092dfda3f07ef6eba9
-
Size
940KB
-
Sample
230413-fsc2saba2w
-
MD5
dd968a978ab49267fded2c78706b72f8
-
SHA1
f445d001c5921c3b8ef86f259d98566a817431d0
-
SHA256
59fbd8c5d36e07b328ebed8851c6e25e01a9650b5711db092dfda3f07ef6eba9
-
SHA512
9bffafb0db0abc680096de8724ac6a9bb9478631e0061e911acf58f9c52cedee3fb7fb1504751b9f26816270a987c83e5a7ea54e3446283099582877bcba87b4
-
SSDEEP
24576:gyjv39j3Cm7wwYMTa7l5qKs3WXAPQyjyI9iRsnud:nb39j3nE/MTa7l0KsbPRmLsn
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
59fbd8c5d36e07b328ebed8851c6e25e01a9650b5711db092dfda3f07ef6eba9
-
Size
940KB
-
MD5
dd968a978ab49267fded2c78706b72f8
-
SHA1
f445d001c5921c3b8ef86f259d98566a817431d0
-
SHA256
59fbd8c5d36e07b328ebed8851c6e25e01a9650b5711db092dfda3f07ef6eba9
-
SHA512
9bffafb0db0abc680096de8724ac6a9bb9478631e0061e911acf58f9c52cedee3fb7fb1504751b9f26816270a987c83e5a7ea54e3446283099582877bcba87b4
-
SSDEEP
24576:gyjv39j3Cm7wwYMTa7l5qKs3WXAPQyjyI9iRsnud:nb39j3nE/MTa7l0KsbPRmLsn
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-