General
-
Target
c30e1bde7dff42a537157ce6794e11320d688dd55dbe2e726e843401425461b2
-
Size
1.0MB
-
Sample
230414-g9sn8sab3w
-
MD5
172fd98bea013780e10df694a7c24536
-
SHA1
1e2e3b8110b1c8329e37bc42e86dd72a99070c36
-
SHA256
c30e1bde7dff42a537157ce6794e11320d688dd55dbe2e726e843401425461b2
-
SHA512
b48f6f6a9c1b5d9942ae18164d210918c5a00b323e26a31e4b51b77e6632c541dbbf82584c6951612f42bfbbefeaefb996290536186364d579384babddb1eda2
-
SSDEEP
24576:ByX7Rh7Zbb9fdA9XPCUVsnFLs3w56X+9fARfLxFIiaZvxY:0X37Zf9FCCUIsgIzjbK
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
c30e1bde7dff42a537157ce6794e11320d688dd55dbe2e726e843401425461b2
-
Size
1.0MB
-
MD5
172fd98bea013780e10df694a7c24536
-
SHA1
1e2e3b8110b1c8329e37bc42e86dd72a99070c36
-
SHA256
c30e1bde7dff42a537157ce6794e11320d688dd55dbe2e726e843401425461b2
-
SHA512
b48f6f6a9c1b5d9942ae18164d210918c5a00b323e26a31e4b51b77e6632c541dbbf82584c6951612f42bfbbefeaefb996290536186364d579384babddb1eda2
-
SSDEEP
24576:ByX7Rh7Zbb9fdA9XPCUVsnFLs3w56X+9fARfLxFIiaZvxY:0X37Zf9FCCUIsgIzjbK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-