General
-
Target
5ead4f6ca271e6f76ef0da78c46feb677feb1276ab907258bc83e42e5bb3e9d3
-
Size
1.5MB
-
Sample
230414-erenjshe4z
-
MD5
1e4b095133fe25e6cdeb8b5b8bad23b8
-
SHA1
e7d12af473313285a9e2932c69640ae97db202a6
-
SHA256
5ead4f6ca271e6f76ef0da78c46feb677feb1276ab907258bc83e42e5bb3e9d3
-
SHA512
ff3e74edb584a4f0c380e8c34cd152a7520452c65b8742b71e67bc89b239ff5727c818c0340f25be1e04a15cfc49e02533422cc9bbf215a6276b0fa419c8b52c
-
SSDEEP
49152:kaZpKoifel7sI+aHGTkZWbKnJcrW207t:dKowQ9+am4pCi2c
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
masi
185.161.248.90:4125
-
auth_value
6e26457e57602c4cf35356c36d8dd8e8
Targets
-
-
Target
5ead4f6ca271e6f76ef0da78c46feb677feb1276ab907258bc83e42e5bb3e9d3
-
Size
1.5MB
-
MD5
1e4b095133fe25e6cdeb8b5b8bad23b8
-
SHA1
e7d12af473313285a9e2932c69640ae97db202a6
-
SHA256
5ead4f6ca271e6f76ef0da78c46feb677feb1276ab907258bc83e42e5bb3e9d3
-
SHA512
ff3e74edb584a4f0c380e8c34cd152a7520452c65b8742b71e67bc89b239ff5727c818c0340f25be1e04a15cfc49e02533422cc9bbf215a6276b0fa419c8b52c
-
SSDEEP
49152:kaZpKoifel7sI+aHGTkZWbKnJcrW207t:dKowQ9+am4pCi2c
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-