General
-
Target
902b7c150ab6b1898639db0f0f8bde9d117da3466c4b94a4e58b5cac8bea5d52
-
Size
1.5MB
-
Sample
230414-je3l3agh88
-
MD5
073d9f4c04383794b17f540bbfec5662
-
SHA1
6e081953cb25f297020cc932b97d5bc0c43f98d4
-
SHA256
902b7c150ab6b1898639db0f0f8bde9d117da3466c4b94a4e58b5cac8bea5d52
-
SHA512
3aa704be022ad7930a8c346279c412768675931fc46b50b0d52b37e7adfbf9c9f366335b6b219111caaf8a04b493ab34dfcf36d14ab76b43b12cc96bc36e226e
-
SSDEEP
24576:1yL5LBIeMBEN6nahmUXsVF8/EtKST2WKP4ICPmGI/G1l95dMquC8RSNH0b40t:QL5BIhEN6/UcI/ElSB4U/G1DXeC4SMT
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
masi
185.161.248.90:4125
-
auth_value
6e26457e57602c4cf35356c36d8dd8e8
Targets
-
-
Target
902b7c150ab6b1898639db0f0f8bde9d117da3466c4b94a4e58b5cac8bea5d52
-
Size
1.5MB
-
MD5
073d9f4c04383794b17f540bbfec5662
-
SHA1
6e081953cb25f297020cc932b97d5bc0c43f98d4
-
SHA256
902b7c150ab6b1898639db0f0f8bde9d117da3466c4b94a4e58b5cac8bea5d52
-
SHA512
3aa704be022ad7930a8c346279c412768675931fc46b50b0d52b37e7adfbf9c9f366335b6b219111caaf8a04b493ab34dfcf36d14ab76b43b12cc96bc36e226e
-
SSDEEP
24576:1yL5LBIeMBEN6nahmUXsVF8/EtKST2WKP4ICPmGI/G1l95dMquC8RSNH0b40t:QL5BIhEN6/UcI/ElSB4U/G1DXeC4SMT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-