General
-
Target
187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c
-
Size
1.1MB
-
Sample
230413-r5r71scb42
-
MD5
f80b4f915aace5b0ede345bf227d2d96
-
SHA1
4aeeb87b85a4daf1e08dab31ac9eac53913dd584
-
SHA256
187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c
-
SHA512
e74f8f746b53817e4a4fb4f2c1662f376a9bd79b1b2a5fb075279abe3204762fb1fbdb8abb05f6cfc3066dfe9a5bd83a59b3498ce2773b9596319d72a0c1eacc
-
SSDEEP
24576:9yCFFpeejZyLTFjdDG85pA3sTRyHyuFEQUxv005tXe:Y0neewLhhDPE3DFEv
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c
-
Size
1.1MB
-
MD5
f80b4f915aace5b0ede345bf227d2d96
-
SHA1
4aeeb87b85a4daf1e08dab31ac9eac53913dd584
-
SHA256
187c79698c8007750a9dd53bfb530bfb70d33ab99dc67671117d5711b29a3e0c
-
SHA512
e74f8f746b53817e4a4fb4f2c1662f376a9bd79b1b2a5fb075279abe3204762fb1fbdb8abb05f6cfc3066dfe9a5bd83a59b3498ce2773b9596319d72a0c1eacc
-
SSDEEP
24576:9yCFFpeejZyLTFjdDG85pA3sTRyHyuFEQUxv005tXe:Y0neewLhhDPE3DFEv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-