General
-
Target
7a848ab4a0fc7ebeac2120fb7a4bc9a66d1fb1edd538a1f2e107f2dc79666f72
-
Size
1.5MB
-
Sample
230414-j6ts8sae7x
-
MD5
dfa520d2f5ce8af2b8b74068290e905d
-
SHA1
42b5bde52f112f108e1786ebe435ce3e04c138ba
-
SHA256
7a848ab4a0fc7ebeac2120fb7a4bc9a66d1fb1edd538a1f2e107f2dc79666f72
-
SHA512
087525583d56480ea494ea48fe1c49313c6dd4cc37eefd1068e697f16d50065a5384437415e2e2806c119ab3978b9c4ad940c22e280ae7403c16f742c12f6863
-
SSDEEP
24576:kyX4t94PMcMNfd9U6Sx0DDLXu8U9bcOfuZ1EN2u9129rgCYauwErqVfchblmK+:zXMY+9U6Sx0DUP32u91q8CYauwdN+bZ
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
masi
185.161.248.90:4125
-
auth_value
6e26457e57602c4cf35356c36d8dd8e8
Targets
-
-
Target
7a848ab4a0fc7ebeac2120fb7a4bc9a66d1fb1edd538a1f2e107f2dc79666f72
-
Size
1.5MB
-
MD5
dfa520d2f5ce8af2b8b74068290e905d
-
SHA1
42b5bde52f112f108e1786ebe435ce3e04c138ba
-
SHA256
7a848ab4a0fc7ebeac2120fb7a4bc9a66d1fb1edd538a1f2e107f2dc79666f72
-
SHA512
087525583d56480ea494ea48fe1c49313c6dd4cc37eefd1068e697f16d50065a5384437415e2e2806c119ab3978b9c4ad940c22e280ae7403c16f742c12f6863
-
SSDEEP
24576:kyX4t94PMcMNfd9U6Sx0DDLXu8U9bcOfuZ1EN2u9129rgCYauwErqVfchblmK+:zXMY+9U6Sx0DUP32u91q8CYauwdN+bZ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-