General
-
Target
aaf7bf26a5111e7d45205931c2571b9f413fe5357eb0913072564a8e58601ec7
-
Size
1.2MB
-
Sample
230414-j4m8nshb28
-
MD5
187f32c67ce7f401e35c5899363107a2
-
SHA1
3a9d71734f47abcb9d104c04812c28176b13d126
-
SHA256
aaf7bf26a5111e7d45205931c2571b9f413fe5357eb0913072564a8e58601ec7
-
SHA512
b6ffd09fe47ab7bf844a04e813f9ec0207f85f3a287fad062339a6c193a6f1befe708b5c779b5792e4fa46066636160104210f47a61e5e79f9123d46d4466197
-
SSDEEP
24576:Ly3CGU5Jtou9EoAPU21A9NigG5F3SAoICarxgU:+3C70hoGU210EgG5F3SAk
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
aaf7bf26a5111e7d45205931c2571b9f413fe5357eb0913072564a8e58601ec7
-
Size
1.2MB
-
MD5
187f32c67ce7f401e35c5899363107a2
-
SHA1
3a9d71734f47abcb9d104c04812c28176b13d126
-
SHA256
aaf7bf26a5111e7d45205931c2571b9f413fe5357eb0913072564a8e58601ec7
-
SHA512
b6ffd09fe47ab7bf844a04e813f9ec0207f85f3a287fad062339a6c193a6f1befe708b5c779b5792e4fa46066636160104210f47a61e5e79f9123d46d4466197
-
SSDEEP
24576:Ly3CGU5Jtou9EoAPU21A9NigG5F3SAoICarxgU:+3C70hoGU210EgG5F3SAk
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-