General
-
Target
6d9af1631e714a00b5bcf5155bfcd77ea1cce165debc22f72a537c3a19a0aedd
-
Size
1.0MB
-
Sample
230414-dyjemshd21
-
MD5
ea241ba82ea75a20e3768f6d249df78c
-
SHA1
c637ad277369e1782a062fc01dbe2acd2d1ca1fa
-
SHA256
6d9af1631e714a00b5bcf5155bfcd77ea1cce165debc22f72a537c3a19a0aedd
-
SHA512
0d5e4461d119eb79728f5f8f45de30c780b94a0fce8646f5e225bbb139688b25bf2eddb29f24820fa2e23176f8e898578291e51686b5119f730c886ff78301c5
-
SSDEEP
24576:ly0fh4PKNqlsz1msDU65bHdiDD+3SkJW/HOmZ:A0mE91XhHd9vyD
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
6d9af1631e714a00b5bcf5155bfcd77ea1cce165debc22f72a537c3a19a0aedd
-
Size
1.0MB
-
MD5
ea241ba82ea75a20e3768f6d249df78c
-
SHA1
c637ad277369e1782a062fc01dbe2acd2d1ca1fa
-
SHA256
6d9af1631e714a00b5bcf5155bfcd77ea1cce165debc22f72a537c3a19a0aedd
-
SHA512
0d5e4461d119eb79728f5f8f45de30c780b94a0fce8646f5e225bbb139688b25bf2eddb29f24820fa2e23176f8e898578291e51686b5119f730c886ff78301c5
-
SSDEEP
24576:ly0fh4PKNqlsz1msDU65bHdiDD+3SkJW/HOmZ:A0mE91XhHd9vyD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-