General
-
Target
9ff354f098a4a454d29dc8fbd0db2a3f3cfb8c5c5331c131ef4be676dd4526a0
-
Size
1.0MB
-
Sample
230415-bqdhbacf36
-
MD5
834b5a61972af4e157376670913414e3
-
SHA1
bcddcfc3f29591b900ea6e0829058fc445beef7a
-
SHA256
9ff354f098a4a454d29dc8fbd0db2a3f3cfb8c5c5331c131ef4be676dd4526a0
-
SHA512
54df9d871595d56305c0267c14d7c9d00e67b28f67bc1b3d86bce80210d4ae74a8644f312ed886d2a603c9cc9af4dd45f02da4a242b2b4690b90a35657d31dc6
-
SSDEEP
24576:GyUOuBonMj4WwM5KYyJ8/dKri9ugc9wMjassK/mryHV7M:VUsM0A5KT6lIgvMRLHV
Static task
static1
Malware Config
Extracted
redline
soft
77.91.124.146:4121
-
auth_value
e65663e455bca3c5699650b66e76ceaa
Extracted
redline
dirx
77.91.124.146:4121
-
auth_value
522d988f763be056e53e089f74d464cc
Targets
-
-
Target
9ff354f098a4a454d29dc8fbd0db2a3f3cfb8c5c5331c131ef4be676dd4526a0
-
Size
1.0MB
-
MD5
834b5a61972af4e157376670913414e3
-
SHA1
bcddcfc3f29591b900ea6e0829058fc445beef7a
-
SHA256
9ff354f098a4a454d29dc8fbd0db2a3f3cfb8c5c5331c131ef4be676dd4526a0
-
SHA512
54df9d871595d56305c0267c14d7c9d00e67b28f67bc1b3d86bce80210d4ae74a8644f312ed886d2a603c9cc9af4dd45f02da4a242b2b4690b90a35657d31dc6
-
SSDEEP
24576:GyUOuBonMj4WwM5KYyJ8/dKri9ugc9wMjassK/mryHV7M:VUsM0A5KT6lIgvMRLHV
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-