General
-
Target
9b455f06c676e15e745352c7bd8f8296aba37b00af961b4e2b74ce71fe1ffef6
-
Size
1.5MB
-
Sample
230414-jw1tssha84
-
MD5
78dde2c29cc481e320b28c85bef19db2
-
SHA1
8d7fb89b97bbcedfd870878ce3849cfe4132c972
-
SHA256
9b455f06c676e15e745352c7bd8f8296aba37b00af961b4e2b74ce71fe1ffef6
-
SHA512
5c1583861e2b787eec5aa983530240501903736e8b21c27ee981aa77efe32d84666fb53b9a7721cebbb8b4b7af165cd405aaad60a11fa1d36f4f9651a3396d26
-
SSDEEP
49152:QZmO0bkkK9ZTTpFDX+WxUHdKg1hV8eVg6966Vaz1VJQK:kmO0NKrTT8nhVnhCNd
Static task
static1
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
193.201.9.43/plays/chapter/index.php
Extracted
redline
masi
185.161.248.90:4125
-
auth_value
6e26457e57602c4cf35356c36d8dd8e8
Targets
-
-
Target
9b455f06c676e15e745352c7bd8f8296aba37b00af961b4e2b74ce71fe1ffef6
-
Size
1.5MB
-
MD5
78dde2c29cc481e320b28c85bef19db2
-
SHA1
8d7fb89b97bbcedfd870878ce3849cfe4132c972
-
SHA256
9b455f06c676e15e745352c7bd8f8296aba37b00af961b4e2b74ce71fe1ffef6
-
SHA512
5c1583861e2b787eec5aa983530240501903736e8b21c27ee981aa77efe32d84666fb53b9a7721cebbb8b4b7af165cd405aaad60a11fa1d36f4f9651a3396d26
-
SSDEEP
49152:QZmO0bkkK9ZTTpFDX+WxUHdKg1hV8eVg6966Vaz1VJQK:kmO0NKrTT8nhVnhCNd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-