General
-
Target
d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e
-
Size
1.0MB
-
Sample
230414-j6qftaae7w
-
MD5
c2c5ac07c8afec4e2a3dccd31038ce92
-
SHA1
04019bba4b6a4a02308664c131a4e4eae6bfd587
-
SHA256
d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e
-
SHA512
dc70f36fc4e643c25995173f0ff05b74cdd2ee98cdd53e770dfe330361253c1e1b7035a6e60c3dfa831beb5076a8908eb4ac503674ef6764c85ca37281545abe
-
SSDEEP
24576:7y02x2N4tM7aBtl21k92UtKI83FaQyOJ2dqgo:ui7wl21g5YI+Fab3dq
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e
-
Size
1.0MB
-
MD5
c2c5ac07c8afec4e2a3dccd31038ce92
-
SHA1
04019bba4b6a4a02308664c131a4e4eae6bfd587
-
SHA256
d55d575b83b340ce38388968404dcfab30aa0fe1e6a894cf83d502768de6001e
-
SHA512
dc70f36fc4e643c25995173f0ff05b74cdd2ee98cdd53e770dfe330361253c1e1b7035a6e60c3dfa831beb5076a8908eb4ac503674ef6764c85ca37281545abe
-
SSDEEP
24576:7y02x2N4tM7aBtl21k92UtKI83FaQyOJ2dqgo:ui7wl21g5YI+Fab3dq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-