General
-
Target
64ea4770a017de00a3713a4e4536d284f0bee32952c70746916caf5c6223d3c1
-
Size
941KB
-
Sample
230413-k9n8laae45
-
MD5
a5dbab87827c6855347170087877cb09
-
SHA1
116400d51513e81a1e50e1522df8800a5997830a
-
SHA256
64ea4770a017de00a3713a4e4536d284f0bee32952c70746916caf5c6223d3c1
-
SHA512
4c8bc6bbb0e3c17b3fb9be640a673eb2c8941b498e15bb00e4f723ba33e32858757c7625bc2dce507c2e00f6347c031e7bba4db4e0ffee99fbb4b1ca7cf5c27c
-
SSDEEP
12288:kMrCy90d3JkY3J7RJKLw1r1SVK/SxpLj9hZedsx9njTs8eBzuKFzXNuvArRL21S+:uyKJ1J7RXS3IKxpjRe/9duArRreIQt
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
64ea4770a017de00a3713a4e4536d284f0bee32952c70746916caf5c6223d3c1
-
Size
941KB
-
MD5
a5dbab87827c6855347170087877cb09
-
SHA1
116400d51513e81a1e50e1522df8800a5997830a
-
SHA256
64ea4770a017de00a3713a4e4536d284f0bee32952c70746916caf5c6223d3c1
-
SHA512
4c8bc6bbb0e3c17b3fb9be640a673eb2c8941b498e15bb00e4f723ba33e32858757c7625bc2dce507c2e00f6347c031e7bba4db4e0ffee99fbb4b1ca7cf5c27c
-
SSDEEP
12288:kMrCy90d3JkY3J7RJKLw1r1SVK/SxpLj9hZedsx9njTs8eBzuKFzXNuvArRL21S+:uyKJ1J7RXS3IKxpjRe/9duArRreIQt
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-