General
-
Target
824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1
-
Size
1.0MB
-
Sample
230414-d3s5msfh88
-
MD5
50572b81143cd7d7834e99916176781e
-
SHA1
3f6869ad66d164302c3faaf1a11f5126216edc21
-
SHA256
824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1
-
SHA512
27bdf288a5ba7ced613fa3cad36fb68d453c529c0f709c73ca01c92cb82b2cff1b7bc32707923ee540437adc9ea61db9a8632edc13ebc897e9ab4bfad79a4c96
-
SSDEEP
24576:6y/HPqPEOO30+/lGa+P40pytdGMt9q7hg/maOP:B0G/l12yeMtU+ud
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1
-
Size
1.0MB
-
MD5
50572b81143cd7d7834e99916176781e
-
SHA1
3f6869ad66d164302c3faaf1a11f5126216edc21
-
SHA256
824de730b002c9108d6d6502819fcc6ded9cd1729f1ecda604d70d19932721f1
-
SHA512
27bdf288a5ba7ced613fa3cad36fb68d453c529c0f709c73ca01c92cb82b2cff1b7bc32707923ee540437adc9ea61db9a8632edc13ebc897e9ab4bfad79a4c96
-
SSDEEP
24576:6y/HPqPEOO30+/lGa+P40pytdGMt9q7hg/maOP:B0G/l12yeMtU+ud
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-