General
-
Target
3b09dafb0822131637f140e5ddf8cb2ac8c15c13d96ae7810908926435ddabcf
-
Size
1.0MB
-
Sample
230414-hvbmvagg85
-
MD5
4a3fcb9e4fb0bd3313722cb16ea99762
-
SHA1
1c93d276f0c2442455e9d26d5c42cb574dd04ccf
-
SHA256
3b09dafb0822131637f140e5ddf8cb2ac8c15c13d96ae7810908926435ddabcf
-
SHA512
672fd154f8a1d360af150101a8a0105921f5fa693c544e2b69225033023a262b72910bb2d2090606fa1b72ce853ee2db6ee3a175b3dd0f20ad6f52ce3b1343f3
-
SSDEEP
24576:Ky6Ml3wh+pubGVKLFLfI17P1JH6ottWQ0cexcwDW:RhqbGaf27nH6otgQ0c6cwD
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
3b09dafb0822131637f140e5ddf8cb2ac8c15c13d96ae7810908926435ddabcf
-
Size
1.0MB
-
MD5
4a3fcb9e4fb0bd3313722cb16ea99762
-
SHA1
1c93d276f0c2442455e9d26d5c42cb574dd04ccf
-
SHA256
3b09dafb0822131637f140e5ddf8cb2ac8c15c13d96ae7810908926435ddabcf
-
SHA512
672fd154f8a1d360af150101a8a0105921f5fa693c544e2b69225033023a262b72910bb2d2090606fa1b72ce853ee2db6ee3a175b3dd0f20ad6f52ce3b1343f3
-
SSDEEP
24576:Ky6Ml3wh+pubGVKLFLfI17P1JH6ottWQ0cexcwDW:RhqbGaf27nH6otgQ0c6cwD
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-