General
-
Target
cc3e9dd18c9ae78305f67c60851c37a791a67020886f8bd17cb896aa62dee610
-
Size
1.5MB
-
Sample
230414-d1xp2shd3z
-
MD5
e1d6c4fd76716474176aa25686d06800
-
SHA1
6d645d688d06923602ec6ad074ac8c7ec0a650d9
-
SHA256
cc3e9dd18c9ae78305f67c60851c37a791a67020886f8bd17cb896aa62dee610
-
SHA512
b6baa8f43d0ae70cca52b738c099a20c31afc7cc6d7d6a26132399350ef613a4786ca6c0ad8b4845a3561107b70bf52611d874a79985c88911ad8ed1c815def0
-
SSDEEP
24576:zyM997DZ7wvCBXkkUt1mSb+EK6h97RVkFlrbKsS9xWwv1nsCHmwGr4C35:GM99PZ0vCZlUJCFlruTsCHZGr4
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
masi
185.161.248.90:4125
-
auth_value
6e26457e57602c4cf35356c36d8dd8e8
Targets
-
-
Target
cc3e9dd18c9ae78305f67c60851c37a791a67020886f8bd17cb896aa62dee610
-
Size
1.5MB
-
MD5
e1d6c4fd76716474176aa25686d06800
-
SHA1
6d645d688d06923602ec6ad074ac8c7ec0a650d9
-
SHA256
cc3e9dd18c9ae78305f67c60851c37a791a67020886f8bd17cb896aa62dee610
-
SHA512
b6baa8f43d0ae70cca52b738c099a20c31afc7cc6d7d6a26132399350ef613a4786ca6c0ad8b4845a3561107b70bf52611d874a79985c88911ad8ed1c815def0
-
SSDEEP
24576:zyM997DZ7wvCBXkkUt1mSb+EK6h97RVkFlrbKsS9xWwv1nsCHmwGr4C35:GM99PZ0vCZlUJCFlruTsCHZGr4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-