General
-
Target
3c1f88ee007cf9c3cb782fa7359003e0129aceacafe7c0c62335cb86a837bbbc
-
Size
1.0MB
-
Sample
230414-fwq3tagc62
-
MD5
5733b16a8d26caccb3e3b35d1d45f9b5
-
SHA1
27a8d5701795e47b4427fceea54e664fa02e6d5e
-
SHA256
3c1f88ee007cf9c3cb782fa7359003e0129aceacafe7c0c62335cb86a837bbbc
-
SHA512
d5cbcca40783bc85d03640c9d3c29b1b038d5d99575c400886a0c2afc3154a9fa13e19a8b7573fd7df375cd996fdfca64aac24b83c4c077d564aa198cd8a7605
-
SSDEEP
24576:KyR2ZVR8RiU7WOI8RwFShJjRrMTRpvL6GJ1LUkea2Sg:RR2NF0wFSXdrgnJ1LUkWS
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
3c1f88ee007cf9c3cb782fa7359003e0129aceacafe7c0c62335cb86a837bbbc
-
Size
1.0MB
-
MD5
5733b16a8d26caccb3e3b35d1d45f9b5
-
SHA1
27a8d5701795e47b4427fceea54e664fa02e6d5e
-
SHA256
3c1f88ee007cf9c3cb782fa7359003e0129aceacafe7c0c62335cb86a837bbbc
-
SHA512
d5cbcca40783bc85d03640c9d3c29b1b038d5d99575c400886a0c2afc3154a9fa13e19a8b7573fd7df375cd996fdfca64aac24b83c4c077d564aa198cd8a7605
-
SSDEEP
24576:KyR2ZVR8RiU7WOI8RwFShJjRrMTRpvL6GJ1LUkea2Sg:RR2NF0wFSXdrgnJ1LUkWS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-