General
-
Target
ceb5d8d81789e0705df349d33caf0208e98842aa602a1cb7459ee36a95f168bc
-
Size
1.1MB
-
Sample
230413-rsfnfsca53
-
MD5
fcb7df7f23d6775f08b9f981b6f8b704
-
SHA1
4e98a0644a5d87c1d0595c29331066f686cfd1cb
-
SHA256
ceb5d8d81789e0705df349d33caf0208e98842aa602a1cb7459ee36a95f168bc
-
SHA512
c3c8248f0944566361b8fbbe0cf46fa16b8a2ffdf93c5d941fecac52828eb3abb098ced5d22f95526d1cd30af8731640fd1d871a1caeec28aed52838a7994873
-
SSDEEP
24576:qyF1hy7M2BbWLUbq9bAssJW0DXfDHuWVW:xjXJmsaf
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
ceb5d8d81789e0705df349d33caf0208e98842aa602a1cb7459ee36a95f168bc
-
Size
1.1MB
-
MD5
fcb7df7f23d6775f08b9f981b6f8b704
-
SHA1
4e98a0644a5d87c1d0595c29331066f686cfd1cb
-
SHA256
ceb5d8d81789e0705df349d33caf0208e98842aa602a1cb7459ee36a95f168bc
-
SHA512
c3c8248f0944566361b8fbbe0cf46fa16b8a2ffdf93c5d941fecac52828eb3abb098ced5d22f95526d1cd30af8731640fd1d871a1caeec28aed52838a7994873
-
SSDEEP
24576:qyF1hy7M2BbWLUbq9bAssJW0DXfDHuWVW:xjXJmsaf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-