General
-
Target
e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf
-
Size
1.0MB
-
Sample
230414-eash3shd7y
-
MD5
a2a426d22a2bf231dcc248b52c49efea
-
SHA1
fda20206948431e1f369ba08d761883844187a10
-
SHA256
e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf
-
SHA512
bba44425ca474edc4754066f979ea80a0ea722159e54613d14f5f2a8bb61ef43b69f8a467e22c9b035fea77fcaaf2ff9b5f84858ae5cce4c988aa8f5d541e504
-
SSDEEP
24576:Ey/x4aK5bPjowa/Z8JFK1FQDr6fpfWc+MA4Eq8Ora9D1L:T/1K9Pcl/ZpaD+fUcNaV
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf
-
Size
1.0MB
-
MD5
a2a426d22a2bf231dcc248b52c49efea
-
SHA1
fda20206948431e1f369ba08d761883844187a10
-
SHA256
e07aebaaffc8a7caaec8679e9abe2660063c7fb8501bd3db8bcd6ac19447cddf
-
SHA512
bba44425ca474edc4754066f979ea80a0ea722159e54613d14f5f2a8bb61ef43b69f8a467e22c9b035fea77fcaaf2ff9b5f84858ae5cce4c988aa8f5d541e504
-
SSDEEP
24576:Ey/x4aK5bPjowa/Z8JFK1FQDr6fpfWc+MA4Eq8Ora9D1L:T/1K9Pcl/ZpaD+fUcNaV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-