General
-
Target
5d481f9c0a82a0a9cfa97ba5406423a1b6a65a3354e863d6e72063f5caf810b4
-
Size
1.5MB
-
Sample
230414-f5kx6ahg6y
-
MD5
a3c89ce659fa5a25ad1238e7c143d2c6
-
SHA1
1eb60ae739d0fa3de930bda12a6e74fe29de2b5f
-
SHA256
5d481f9c0a82a0a9cfa97ba5406423a1b6a65a3354e863d6e72063f5caf810b4
-
SHA512
c6e5b882fe8913bed06c7b3ac5bfb85624206d658f2b2ce2712a97f8c66fb21c0524ca420b6040c484e809789abb99700cec567a40a929bc911a44b02af45f5c
-
SSDEEP
49152:yt6bYe6XnB/hSxRb0gNOAz8QbFoHVL/e:CkexZSXY8V8OFoHVL/
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
masi
185.161.248.90:4125
-
auth_value
6e26457e57602c4cf35356c36d8dd8e8
Targets
-
-
Target
5d481f9c0a82a0a9cfa97ba5406423a1b6a65a3354e863d6e72063f5caf810b4
-
Size
1.5MB
-
MD5
a3c89ce659fa5a25ad1238e7c143d2c6
-
SHA1
1eb60ae739d0fa3de930bda12a6e74fe29de2b5f
-
SHA256
5d481f9c0a82a0a9cfa97ba5406423a1b6a65a3354e863d6e72063f5caf810b4
-
SHA512
c6e5b882fe8913bed06c7b3ac5bfb85624206d658f2b2ce2712a97f8c66fb21c0524ca420b6040c484e809789abb99700cec567a40a929bc911a44b02af45f5c
-
SSDEEP
49152:yt6bYe6XnB/hSxRb0gNOAz8QbFoHVL/e:CkexZSXY8V8OFoHVL/
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-