General
-
Target
c819636e6c05073d0cd3e4295c5994a90f203e060c2175e2488a2c57ac664b24
-
Size
961KB
-
Sample
230413-s7lzfscd73
-
MD5
bf76baa4150bf0d49bd5276dd604e516
-
SHA1
a4cecea3f774efe675e10879faa573490b018b1b
-
SHA256
c819636e6c05073d0cd3e4295c5994a90f203e060c2175e2488a2c57ac664b24
-
SHA512
0f68d6bb7427210ffb29777d2c9fa8319f7441939ac84ba5cb6f0123aed396b63db222feddcf8e6579fafcf8bdf63eac2f95e926fbe9776799220c1ebe073468
-
SSDEEP
12288:UMrhy9008HoGhoF8T08pAFThNNsRyFdLQsZfD9gexH42pPD4Cmf1gjQsWVJr86Pt:tyQHYY0Fh8YdDfBge1Dhmdz1PS5r6r
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
c819636e6c05073d0cd3e4295c5994a90f203e060c2175e2488a2c57ac664b24
-
Size
961KB
-
MD5
bf76baa4150bf0d49bd5276dd604e516
-
SHA1
a4cecea3f774efe675e10879faa573490b018b1b
-
SHA256
c819636e6c05073d0cd3e4295c5994a90f203e060c2175e2488a2c57ac664b24
-
SHA512
0f68d6bb7427210ffb29777d2c9fa8319f7441939ac84ba5cb6f0123aed396b63db222feddcf8e6579fafcf8bdf63eac2f95e926fbe9776799220c1ebe073468
-
SSDEEP
12288:UMrhy9008HoGhoF8T08pAFThNNsRyFdLQsZfD9gexH42pPD4Cmf1gjQsWVJr86Pt:tyQHYY0Fh8YdDfBge1Dhmdz1PS5r6r
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-