General
-
Target
d74076ff4ff31ab630335ada587b128cf29a2562879fc302d32a55e1a658b836
-
Size
1.0MB
-
Sample
230414-ev9cbsga97
-
MD5
ba2824d3a5df77416e1cbf6069c8f93c
-
SHA1
c770b28ef7f86ce772bab4b56fe28d6e67f69a1b
-
SHA256
d74076ff4ff31ab630335ada587b128cf29a2562879fc302d32a55e1a658b836
-
SHA512
6eb890c65fbd64d7a33ec7ff02e7e27470af846048c44a2b9e762f7d9551d3eef169adffb69fa69280f8fea0c72c03eff409099e1d2fce2eb2ac2411aaaf7899
-
SSDEEP
24576:6yErUt6ShQGtiQgY9FPTQyVLFkoMnkCKtZgEjELKv+R+:BErUttQlezVZkbjsEKv
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
d74076ff4ff31ab630335ada587b128cf29a2562879fc302d32a55e1a658b836
-
Size
1.0MB
-
MD5
ba2824d3a5df77416e1cbf6069c8f93c
-
SHA1
c770b28ef7f86ce772bab4b56fe28d6e67f69a1b
-
SHA256
d74076ff4ff31ab630335ada587b128cf29a2562879fc302d32a55e1a658b836
-
SHA512
6eb890c65fbd64d7a33ec7ff02e7e27470af846048c44a2b9e762f7d9551d3eef169adffb69fa69280f8fea0c72c03eff409099e1d2fce2eb2ac2411aaaf7899
-
SSDEEP
24576:6yErUt6ShQGtiQgY9FPTQyVLFkoMnkCKtZgEjELKv+R+:BErUttQlezVZkbjsEKv
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-