General
-
Target
de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f
-
Size
1.1MB
-
Sample
230413-kn2a2aad36
-
MD5
9ea54d8b40d2b2d6b188036f658583db
-
SHA1
5a7f5bbc2355c3573cce0833ffe6515522a505bd
-
SHA256
de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f
-
SHA512
8ad3211f1599a0dac4721b2c60a71a287b578680a1f16da8ffbf3bc47c45df73090cea834ee876ab03232d4eb806ddf882c3e162acef9520b61c580d38b1a562
-
SSDEEP
24576:zyVFIVfOpBEMmyRcX5xEWD3S/vePwtEUVlLaTpfh:GVGVGpqMTQ5xEWrKv54p
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f
-
Size
1.1MB
-
MD5
9ea54d8b40d2b2d6b188036f658583db
-
SHA1
5a7f5bbc2355c3573cce0833ffe6515522a505bd
-
SHA256
de425f273ebe511e3804e146fd5486b6afe0557945e8bf4daa1fc50f739a754f
-
SHA512
8ad3211f1599a0dac4721b2c60a71a287b578680a1f16da8ffbf3bc47c45df73090cea834ee876ab03232d4eb806ddf882c3e162acef9520b61c580d38b1a562
-
SSDEEP
24576:zyVFIVfOpBEMmyRcX5xEWD3S/vePwtEUVlLaTpfh:GVGVGpqMTQ5xEWrKv54p
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-