General
-
Target
c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5
-
Size
1.1MB
-
Sample
230413-qvdffada7x
-
MD5
dbcaa29eaa3a43e220d621f52c67e0ef
-
SHA1
9c1f4424f811c6db5c558d99517ec6c4a9349a77
-
SHA256
c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5
-
SHA512
ebcfbe591e9f699671b8ec3cf7f6279800f94610ebe2eea87adb79690f5351af76a7e72a8fd1b3882ab0845a12fc36902534815cf2a61be32cb0bc9f0ebcbf28
-
SSDEEP
24576:wy6JZpvVmqCPuPKTrXvBAaCbAkSTFN0ZUd6WwdrsDY1d:36XXVPKnXvBzrkBtrse
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5
-
Size
1.1MB
-
MD5
dbcaa29eaa3a43e220d621f52c67e0ef
-
SHA1
9c1f4424f811c6db5c558d99517ec6c4a9349a77
-
SHA256
c66268b7c76251665f93db0e2b9bd7954136dce5b84885b06c17d3669fd201f5
-
SHA512
ebcfbe591e9f699671b8ec3cf7f6279800f94610ebe2eea87adb79690f5351af76a7e72a8fd1b3882ab0845a12fc36902534815cf2a61be32cb0bc9f0ebcbf28
-
SSDEEP
24576:wy6JZpvVmqCPuPKTrXvBAaCbAkSTFN0ZUd6WwdrsDY1d:36XXVPKnXvBzrkBtrse
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-