General
-
Target
da411cad12d2fb5ec1249fa7eb0a0e4556b0023f12a32317314bd174b9fee40d
-
Size
1.4MB
-
Sample
230414-akm9wsfb42
-
MD5
a9eff46379de0fc22d1901ef14376992
-
SHA1
6233789435bf2cb88868449be3189dd1d157d1ec
-
SHA256
da411cad12d2fb5ec1249fa7eb0a0e4556b0023f12a32317314bd174b9fee40d
-
SHA512
861256a89327dac826041af743e9c20ba6a3bd95289799516765e7c69a869e20c1df70cdbac3fdacb327c2bf3d9aa9f4e4dd44f1573b84a89c829596ef296094
-
SSDEEP
24576:pyXqG95z9nxJaf0QtlOqxGKM3XsYsw9jF/bVN49VB9g9aSCwx0jHtmB3vIv:cXqG9d9nxE5lOqxgswdF/xGb/g9RCw
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
masi
185.161.248.90:4125
-
auth_value
6e26457e57602c4cf35356c36d8dd8e8
Targets
-
-
Target
da411cad12d2fb5ec1249fa7eb0a0e4556b0023f12a32317314bd174b9fee40d
-
Size
1.4MB
-
MD5
a9eff46379de0fc22d1901ef14376992
-
SHA1
6233789435bf2cb88868449be3189dd1d157d1ec
-
SHA256
da411cad12d2fb5ec1249fa7eb0a0e4556b0023f12a32317314bd174b9fee40d
-
SHA512
861256a89327dac826041af743e9c20ba6a3bd95289799516765e7c69a869e20c1df70cdbac3fdacb327c2bf3d9aa9f4e4dd44f1573b84a89c829596ef296094
-
SSDEEP
24576:pyXqG95z9nxJaf0QtlOqxGKM3XsYsw9jF/bVN49VB9g9aSCwx0jHtmB3vIv:cXqG9d9nxE5lOqxgswdF/xGb/g9RCw
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-