General
-
Target
2ea4432c315c27df722fcfe34f1a229507fa908baaa40eadbe335963426d3400
-
Size
962KB
-
Sample
230413-tpmnpsdh3w
-
MD5
a751fcbd039cce3be973cd16c14c314f
-
SHA1
08ea988431c7eb571c9d55fe8c6bd420ae56778a
-
SHA256
2ea4432c315c27df722fcfe34f1a229507fa908baaa40eadbe335963426d3400
-
SHA512
61fb294b9ff5df9a51f632f1c69c1a6cc4a7829c797f466f9515c59f6c0d945b7c8c035e89b530cf3fc2d5b5fb30ac3861b687d37185cac916493ef3359546f0
-
SSDEEP
24576:ZyA71N056l2QDrJmK/NoUys0zptExLUb:MA7j08tDr7Noe0taL
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Targets
-
-
Target
2ea4432c315c27df722fcfe34f1a229507fa908baaa40eadbe335963426d3400
-
Size
962KB
-
MD5
a751fcbd039cce3be973cd16c14c314f
-
SHA1
08ea988431c7eb571c9d55fe8c6bd420ae56778a
-
SHA256
2ea4432c315c27df722fcfe34f1a229507fa908baaa40eadbe335963426d3400
-
SHA512
61fb294b9ff5df9a51f632f1c69c1a6cc4a7829c797f466f9515c59f6c0d945b7c8c035e89b530cf3fc2d5b5fb30ac3861b687d37185cac916493ef3359546f0
-
SSDEEP
24576:ZyA71N056l2QDrJmK/NoUys0zptExLUb:MA7j08tDr7Noe0taL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-