General
-
Target
291fd1391cdd6ce345b813fc73583d698a083c4eb9b82bae8f5486ce41a0495d
-
Size
940KB
-
Sample
230413-lxl35sca4w
-
MD5
b3b4150a8ce5f5af185edc90ad768d9c
-
SHA1
f48d557721805c31eb3882d6b271b73826a63b21
-
SHA256
291fd1391cdd6ce345b813fc73583d698a083c4eb9b82bae8f5486ce41a0495d
-
SHA512
186af0661058a6b9d857c46d23823810af93bc2802915c1c98bd99baf7c74920e23f7e4d3fa5bac330d9ef6e486523b196479cdacd871015185ddaa38406f52f
-
SSDEEP
24576:FywSBc7KIpygR+Q2LMCXI4e37fx7mtqG4blqD12:ghc7KyR+WJ37xmwGAG
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
291fd1391cdd6ce345b813fc73583d698a083c4eb9b82bae8f5486ce41a0495d
-
Size
940KB
-
MD5
b3b4150a8ce5f5af185edc90ad768d9c
-
SHA1
f48d557721805c31eb3882d6b271b73826a63b21
-
SHA256
291fd1391cdd6ce345b813fc73583d698a083c4eb9b82bae8f5486ce41a0495d
-
SHA512
186af0661058a6b9d857c46d23823810af93bc2802915c1c98bd99baf7c74920e23f7e4d3fa5bac330d9ef6e486523b196479cdacd871015185ddaa38406f52f
-
SSDEEP
24576:FywSBc7KIpygR+Q2LMCXI4e37fx7mtqG4blqD12:ghc7KyR+WJ37xmwGAG
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-