General
-
Target
3ebdc92038802668fbaa13970dfeb9256c193e236b783cf0b291234617a76376
-
Size
1.2MB
-
Sample
230414-hl7nxsgg39
-
MD5
d18befacec06e9a9503ecf1c61427efd
-
SHA1
fe915f599c35a10995ec465e8d7942fad4f73ca8
-
SHA256
3ebdc92038802668fbaa13970dfeb9256c193e236b783cf0b291234617a76376
-
SHA512
4865e1fd03d4b0a24b90d8fde64a07042476da26dfa1541444df323229b72bbb2ef0d924d2030f45db26a08d78ebd48bad99ac403b7b899d3f53194f245ad66b
-
SSDEEP
24576:DyInyYZD6RzYRouOa3ZDHT3QVIM6LacizVkSKm2vTMs8Se:WIFZaveZv3Qwa3Gm2YS
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
3ebdc92038802668fbaa13970dfeb9256c193e236b783cf0b291234617a76376
-
Size
1.2MB
-
MD5
d18befacec06e9a9503ecf1c61427efd
-
SHA1
fe915f599c35a10995ec465e8d7942fad4f73ca8
-
SHA256
3ebdc92038802668fbaa13970dfeb9256c193e236b783cf0b291234617a76376
-
SHA512
4865e1fd03d4b0a24b90d8fde64a07042476da26dfa1541444df323229b72bbb2ef0d924d2030f45db26a08d78ebd48bad99ac403b7b899d3f53194f245ad66b
-
SSDEEP
24576:DyInyYZD6RzYRouOa3ZDHT3QVIM6LacizVkSKm2vTMs8Se:WIFZaveZv3Qwa3Gm2YS
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-