General
-
Target
37a3bc379fd88bcf37d968b04b95be2eb9b776491f88653960af9e1d4005cf25
-
Size
1.0MB
-
Sample
230414-ptlvrabc6y
-
MD5
0a7db4729edee1571120cc10ea4b46af
-
SHA1
5361133ef56d31b9152e0e9955dc18451a88a38b
-
SHA256
37a3bc379fd88bcf37d968b04b95be2eb9b776491f88653960af9e1d4005cf25
-
SHA512
a504519a914a2197f14fb7326b3b012faf5f07edceff79b2407c76551692a2d1315560062b163395e20f281748ea92842de06ea32f6978e9ad901331969cfd6f
-
SSDEEP
24576:6y+2RfbIkt7UAFknpnjPA1sGicNlKdZpPxK:B9dISkRjPtG1NlyPx
Static task
static1
Malware Config
Extracted
redline
soft
77.91.124.146:4121
-
auth_value
e65663e455bca3c5699650b66e76ceaa
Extracted
redline
dirx
77.91.124.146:4121
-
auth_value
522d988f763be056e53e089f74d464cc
Targets
-
-
Target
37a3bc379fd88bcf37d968b04b95be2eb9b776491f88653960af9e1d4005cf25
-
Size
1.0MB
-
MD5
0a7db4729edee1571120cc10ea4b46af
-
SHA1
5361133ef56d31b9152e0e9955dc18451a88a38b
-
SHA256
37a3bc379fd88bcf37d968b04b95be2eb9b776491f88653960af9e1d4005cf25
-
SHA512
a504519a914a2197f14fb7326b3b012faf5f07edceff79b2407c76551692a2d1315560062b163395e20f281748ea92842de06ea32f6978e9ad901331969cfd6f
-
SSDEEP
24576:6y+2RfbIkt7UAFknpnjPA1sGicNlKdZpPxK:B9dISkRjPtG1NlyPx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-