General
-
Target
de1a23d23e504c65a594f981f6975153378c5f9082ef9bbed10971b076ddba26
-
Size
1.0MB
-
Sample
230414-dvnvyshc81
-
MD5
8656d6663bf5977186129ca9c81ccec2
-
SHA1
3b926de98ec65237bf55a2e6a907c6bc4e44bf6a
-
SHA256
de1a23d23e504c65a594f981f6975153378c5f9082ef9bbed10971b076ddba26
-
SHA512
bade9dd9f66260ea192cb17cc1fffb08b0907746068f80b7e9560b55d9c59389fcedbeb2617cf5bccc4cddcf79cb739ecc2d089f2917b64d2047d6bcdbf7d5b5
-
SSDEEP
24576:vyKMTr4GhVkMgLNqAyM3L7KtrM9oUk/h0FeIXPEVLHbcW1:6KjGbUjf4rOxckXPE9HbcW
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
de1a23d23e504c65a594f981f6975153378c5f9082ef9bbed10971b076ddba26
-
Size
1.0MB
-
MD5
8656d6663bf5977186129ca9c81ccec2
-
SHA1
3b926de98ec65237bf55a2e6a907c6bc4e44bf6a
-
SHA256
de1a23d23e504c65a594f981f6975153378c5f9082ef9bbed10971b076ddba26
-
SHA512
bade9dd9f66260ea192cb17cc1fffb08b0907746068f80b7e9560b55d9c59389fcedbeb2617cf5bccc4cddcf79cb739ecc2d089f2917b64d2047d6bcdbf7d5b5
-
SSDEEP
24576:vyKMTr4GhVkMgLNqAyM3L7KtrM9oUk/h0FeIXPEVLHbcW1:6KjGbUjf4rOxckXPE9HbcW
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-