General
-
Target
3c7862fdf291968cd804ef4213975e3877bcf54e3c4dc6678e3630961d2aead2
-
Size
1.2MB
-
Sample
230414-e48r6ahe9z
-
MD5
e4ccae5f7a303de9311fba71e4e6b3e1
-
SHA1
76ccae6db269d4311ab3a3d6e7b559db891dfe98
-
SHA256
3c7862fdf291968cd804ef4213975e3877bcf54e3c4dc6678e3630961d2aead2
-
SHA512
4b20af11e97e3e5951ea55c250a4ffd85b8316c7b286a6942ea0d6f8e720db8f05f457ec362ad998e06a343b1454b06c077b0a7e02990ceb76e3d5c26f02370b
-
SSDEEP
24576:Jy+XjF9tcr16vHtM8Wd2uIeGgCLjxqYD5Jj2SZJWGy5ebQUduyg:8+XjFzcr1pdCNLj2SfFy5ebT
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
3c7862fdf291968cd804ef4213975e3877bcf54e3c4dc6678e3630961d2aead2
-
Size
1.2MB
-
MD5
e4ccae5f7a303de9311fba71e4e6b3e1
-
SHA1
76ccae6db269d4311ab3a3d6e7b559db891dfe98
-
SHA256
3c7862fdf291968cd804ef4213975e3877bcf54e3c4dc6678e3630961d2aead2
-
SHA512
4b20af11e97e3e5951ea55c250a4ffd85b8316c7b286a6942ea0d6f8e720db8f05f457ec362ad998e06a343b1454b06c077b0a7e02990ceb76e3d5c26f02370b
-
SSDEEP
24576:Jy+XjF9tcr16vHtM8Wd2uIeGgCLjxqYD5Jj2SZJWGy5ebQUduyg:8+XjFzcr1pdCNLj2SfFy5ebT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-