General
-
Target
eebfda232074ffb7b3675395e3e7b6c273ae417fa3ec3d6eb0fb2f64754beec5
-
Size
940KB
-
Sample
230413-llcqbsae92
-
MD5
270d7749c8a807d2794a21c60745ec0c
-
SHA1
7cba8468e4b207728426d1276f7e64071b52fdeb
-
SHA256
eebfda232074ffb7b3675395e3e7b6c273ae417fa3ec3d6eb0fb2f64754beec5
-
SHA512
e7b6b079f2d1801943283db2dc44e7735a65fd8715cbc20cd34004874651e520b5dcb8284bb56d02417d7826136e2e8120ce9fa58aff70e514f7a87c82d1db68
-
SSDEEP
24576:pyXZpShxINJpAJRC61FUD/P4737FBbyzHHdEUjFEav:cppqmaRC5c37LyzHH/Fv
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
eebfda232074ffb7b3675395e3e7b6c273ae417fa3ec3d6eb0fb2f64754beec5
-
Size
940KB
-
MD5
270d7749c8a807d2794a21c60745ec0c
-
SHA1
7cba8468e4b207728426d1276f7e64071b52fdeb
-
SHA256
eebfda232074ffb7b3675395e3e7b6c273ae417fa3ec3d6eb0fb2f64754beec5
-
SHA512
e7b6b079f2d1801943283db2dc44e7735a65fd8715cbc20cd34004874651e520b5dcb8284bb56d02417d7826136e2e8120ce9fa58aff70e514f7a87c82d1db68
-
SSDEEP
24576:pyXZpShxINJpAJRC61FUD/P4737FBbyzHHdEUjFEav:cppqmaRC5c37LyzHH/Fv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-