General
-
Target
5a341d18d79f62e3916471a5077693d555b7a35c10e9d64addf72f04d5616ea7
-
Size
1.0MB
-
Sample
230415-hb1smadc95
-
MD5
5ec483049c1197d58bb69cc654e49c9c
-
SHA1
21a59ac3209b9c2f78c15d250309ba1e4630a1c3
-
SHA256
5a341d18d79f62e3916471a5077693d555b7a35c10e9d64addf72f04d5616ea7
-
SHA512
990b02a7e92c57ccb1d715f059bbf7242451a0bd1d6ec2f93a84c147c0e2009e19f0daed99c7e9bc2ae99e69561e7fe585aa59e03c2587e45a332073a1f6a1da
-
SSDEEP
12288:+Mriy90qGdCmRl6C2+GoSFm6Pe7rUJCBp7RJ8giJ3Krh6u6DsoGTKQil1X8egK0S:wyGVxTUA7RJ8gMKrh948lVjR5SJYiWY
Static task
static1
Malware Config
Extracted
redline
soft
77.91.124.146:4121
-
auth_value
e65663e455bca3c5699650b66e76ceaa
Extracted
redline
dirx
77.91.124.146:4121
-
auth_value
522d988f763be056e53e089f74d464cc
Targets
-
-
Target
5a341d18d79f62e3916471a5077693d555b7a35c10e9d64addf72f04d5616ea7
-
Size
1.0MB
-
MD5
5ec483049c1197d58bb69cc654e49c9c
-
SHA1
21a59ac3209b9c2f78c15d250309ba1e4630a1c3
-
SHA256
5a341d18d79f62e3916471a5077693d555b7a35c10e9d64addf72f04d5616ea7
-
SHA512
990b02a7e92c57ccb1d715f059bbf7242451a0bd1d6ec2f93a84c147c0e2009e19f0daed99c7e9bc2ae99e69561e7fe585aa59e03c2587e45a332073a1f6a1da
-
SSDEEP
12288:+Mriy90qGdCmRl6C2+GoSFm6Pe7rUJCBp7RJ8giJ3Krh6u6DsoGTKQil1X8egK0S:wyGVxTUA7RJ8gMKrh948lVjR5SJYiWY
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-