General
-
Target
01122a437449ad2bdbc8f7ea09136233aafdbdfe4d4d00895f08e2bb70f4faa9
-
Size
1.2MB
-
Sample
230414-gs34msge57
-
MD5
5e2e2ada7971d1979719661c940e5024
-
SHA1
97377cc5db82c7683c7f2f4553c30371648df7f2
-
SHA256
01122a437449ad2bdbc8f7ea09136233aafdbdfe4d4d00895f08e2bb70f4faa9
-
SHA512
280942bfb51897d11cc999ce438d6def6c832d4d5173ad9c15090a51717b4d02326d3edfc8ada12cdaf6678612ca9b5b4d7a30ed1c7ee8eae03c9ace01a2d9a3
-
SSDEEP
24576:4yOr1y2IUQ+Vee1tHBikdrV8HDLgCbYyMuzAK9b3:/Or19Qcz1N/Ygo1Uq
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
01122a437449ad2bdbc8f7ea09136233aafdbdfe4d4d00895f08e2bb70f4faa9
-
Size
1.2MB
-
MD5
5e2e2ada7971d1979719661c940e5024
-
SHA1
97377cc5db82c7683c7f2f4553c30371648df7f2
-
SHA256
01122a437449ad2bdbc8f7ea09136233aafdbdfe4d4d00895f08e2bb70f4faa9
-
SHA512
280942bfb51897d11cc999ce438d6def6c832d4d5173ad9c15090a51717b4d02326d3edfc8ada12cdaf6678612ca9b5b4d7a30ed1c7ee8eae03c9ace01a2d9a3
-
SSDEEP
24576:4yOr1y2IUQ+Vee1tHBikdrV8HDLgCbYyMuzAK9b3:/Or19Qcz1N/Ygo1Uq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-