General
-
Target
2963ee3a781871df4da4233f0f90094310403266dd2ce9cbac1ad7ec1239987e
-
Size
1.2MB
-
Sample
230414-fl4k6agb98
-
MD5
296edbb781bf547ac2c9644f163ce23d
-
SHA1
372aa715fd7517d645ddc97b42d0aab37b2369cd
-
SHA256
2963ee3a781871df4da4233f0f90094310403266dd2ce9cbac1ad7ec1239987e
-
SHA512
ff210dc7ba18c6a494db15f93ed7e6532430374246af0c0191c72c617f9967599afd2ccd6b831def3d6fe94b5c44a3cacd29109c73470fbe6f5293189aad8ea3
-
SSDEEP
24576:syAnbjwGM/5vQZ8ZbMDwafXX3QR0bYSrGRSSZJbR7qhK7M8hzy:bAnb0GwpTB2wafXXpqRSSfd7e
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
2963ee3a781871df4da4233f0f90094310403266dd2ce9cbac1ad7ec1239987e
-
Size
1.2MB
-
MD5
296edbb781bf547ac2c9644f163ce23d
-
SHA1
372aa715fd7517d645ddc97b42d0aab37b2369cd
-
SHA256
2963ee3a781871df4da4233f0f90094310403266dd2ce9cbac1ad7ec1239987e
-
SHA512
ff210dc7ba18c6a494db15f93ed7e6532430374246af0c0191c72c617f9967599afd2ccd6b831def3d6fe94b5c44a3cacd29109c73470fbe6f5293189aad8ea3
-
SSDEEP
24576:syAnbjwGM/5vQZ8ZbMDwafXX3QR0bYSrGRSSZJbR7qhK7M8hzy:bAnb0GwpTB2wafXXpqRSSfd7e
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-