General
-
Target
ac0b657a5811c16e50d45ce1630b824f487da454c86f53eee28e073f1af69090
-
Size
1.2MB
-
Sample
230414-fsm7ragc45
-
MD5
aa30753f199825a5f28a93ca6662feed
-
SHA1
e62c2c97b90a086cf6f2d40a069fa37316c89ebb
-
SHA256
ac0b657a5811c16e50d45ce1630b824f487da454c86f53eee28e073f1af69090
-
SHA512
d1cd23a8cb2068faa763ee3656388a1303009715b23df7463e76788d00f80b721e068d98f8d33ce374dd68102fc506ddf5853bf2b29c581d67bf0f055504cb9a
-
SSDEEP
24576:lyjIWz0SHlv80NaTfYnpqkmSZJOsKJ4THx1n2SJ8sXM:Ap0SFb5MkmSf3K+32I/X
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
ac0b657a5811c16e50d45ce1630b824f487da454c86f53eee28e073f1af69090
-
Size
1.2MB
-
MD5
aa30753f199825a5f28a93ca6662feed
-
SHA1
e62c2c97b90a086cf6f2d40a069fa37316c89ebb
-
SHA256
ac0b657a5811c16e50d45ce1630b824f487da454c86f53eee28e073f1af69090
-
SHA512
d1cd23a8cb2068faa763ee3656388a1303009715b23df7463e76788d00f80b721e068d98f8d33ce374dd68102fc506ddf5853bf2b29c581d67bf0f055504cb9a
-
SSDEEP
24576:lyjIWz0SHlv80NaTfYnpqkmSZJOsKJ4THx1n2SJ8sXM:Ap0SFb5MkmSf3K+32I/X
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-