General
-
Target
3215e2ee11ee107f07eef74a037c5faa900b119e6aa9012429dbed6e92a1a2fb
-
Size
1.5MB
-
Sample
230414-fd4aesgb75
-
MD5
8c5acc7246369975e7e09f360ee1b7b1
-
SHA1
674f61ceeb37797ebcf42f4a009feabb8a363547
-
SHA256
3215e2ee11ee107f07eef74a037c5faa900b119e6aa9012429dbed6e92a1a2fb
-
SHA512
ec0ebe517fb3ca30543373ef20379d343cf05ccb24fc0027760f9a842642a5135d3231948f99cb3a4d54cb66cfbb87fdb75083f5b223cb95593a83effe77a585
-
SSDEEP
49152:Rmh9L5g1PgTi+ZYOaVZj4P2TECZ44piu:eV5Woe+Zp8ZjEoM4
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
masi
185.161.248.90:4125
-
auth_value
6e26457e57602c4cf35356c36d8dd8e8
Targets
-
-
Target
3215e2ee11ee107f07eef74a037c5faa900b119e6aa9012429dbed6e92a1a2fb
-
Size
1.5MB
-
MD5
8c5acc7246369975e7e09f360ee1b7b1
-
SHA1
674f61ceeb37797ebcf42f4a009feabb8a363547
-
SHA256
3215e2ee11ee107f07eef74a037c5faa900b119e6aa9012429dbed6e92a1a2fb
-
SHA512
ec0ebe517fb3ca30543373ef20379d343cf05ccb24fc0027760f9a842642a5135d3231948f99cb3a4d54cb66cfbb87fdb75083f5b223cb95593a83effe77a585
-
SSDEEP
49152:Rmh9L5g1PgTi+ZYOaVZj4P2TECZ44piu:eV5Woe+Zp8ZjEoM4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-