General
-
Target
4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919
-
Size
1.2MB
-
Sample
230414-jcszvaad5t
-
MD5
5128aea99a02a35a64eb5422bbe170a0
-
SHA1
08cde72eea84bece9e6a152fe9dfd7b1908e5979
-
SHA256
4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919
-
SHA512
27c2916c0e7a64219f1f74402122c3f04ee534b6d16a303d1bb2741c875480971b5ff363c4056809e0b70ed8b068212cbd600b80f2c3390be7f91e661481f24f
-
SSDEEP
24576:KyPNJbImKAE8cQipxCz61u9NsuWV5PYnOr:RlJbmRxCz61CyuWV5i
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Targets
-
-
Target
4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919
-
Size
1.2MB
-
MD5
5128aea99a02a35a64eb5422bbe170a0
-
SHA1
08cde72eea84bece9e6a152fe9dfd7b1908e5979
-
SHA256
4105681a7feb63ced726b5bbf05a3396580059597f578d5827e2fcc40fad5919
-
SHA512
27c2916c0e7a64219f1f74402122c3f04ee534b6d16a303d1bb2741c875480971b5ff363c4056809e0b70ed8b068212cbd600b80f2c3390be7f91e661481f24f
-
SSDEEP
24576:KyPNJbImKAE8cQipxCz61u9NsuWV5PYnOr:RlJbmRxCz61CyuWV5i
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-