General
-
Target
cd465d8a9ec4cdf63d05a155150eb838c27d9dca146355835b305c502c09bb11
-
Size
1.2MB
-
Sample
230414-f1rj5sgc86
-
MD5
b95316f441fe27d292d97f5c7bff77df
-
SHA1
f13ae3e3386640feeb9f9a6e0c1838c95777a431
-
SHA256
cd465d8a9ec4cdf63d05a155150eb838c27d9dca146355835b305c502c09bb11
-
SHA512
09ff646c68417eb92050375a1b4406dbd742d777cd91e4412325740606afac6ba88d2e4b3f0c344c0e21aa6a221da11d172b65ab17d8a09b28192342ad795555
-
SSDEEP
24576:1ygbJk9oMFUFn4McJ17hwxY4uQ2jphM/25Bjrciqvfbe:Qg69oMiF4McJ1ej2B5Bjrc/fb
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
cd465d8a9ec4cdf63d05a155150eb838c27d9dca146355835b305c502c09bb11
-
Size
1.2MB
-
MD5
b95316f441fe27d292d97f5c7bff77df
-
SHA1
f13ae3e3386640feeb9f9a6e0c1838c95777a431
-
SHA256
cd465d8a9ec4cdf63d05a155150eb838c27d9dca146355835b305c502c09bb11
-
SHA512
09ff646c68417eb92050375a1b4406dbd742d777cd91e4412325740606afac6ba88d2e4b3f0c344c0e21aa6a221da11d172b65ab17d8a09b28192342ad795555
-
SSDEEP
24576:1ygbJk9oMFUFn4McJ17hwxY4uQ2jphM/25Bjrciqvfbe:Qg69oMiF4McJ1ej2B5Bjrc/fb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-