General
-
Target
91bfb3e8495b89be16f831e1dba0d1d1374566b949c7917c44926c209a36ff11
-
Size
1.2MB
-
Sample
230415-rz3rkafh71
-
MD5
05585570f3bef87f9932bdc0b6e628b0
-
SHA1
b36e1029d879096bb59ec95549085213ebc9adc5
-
SHA256
91bfb3e8495b89be16f831e1dba0d1d1374566b949c7917c44926c209a36ff11
-
SHA512
c656808d5e3b782f2076b22d07ac4890e85a1ae1f67df6de1495b4b3e66e7f9726aeca06817a024ea15518024afb9ad0c64cace418c995dea2b64424002cedac
-
SSDEEP
24576:iytcUrmDtmPVg79zoP3fN+oq1cSxk1ydJyDIX0XPt+S3LSu:JtcUrPVg7hoffNG1e1ydg8X0YSb
Static task
static1
Malware Config
Extracted
redline
losk
185.161.248.150:4128
-
auth_value
c0a6c391e53d2d9cd27bb17d1d38ada3
Extracted
redline
diza
185.161.248.150:4128
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Targets
-
-
Target
91bfb3e8495b89be16f831e1dba0d1d1374566b949c7917c44926c209a36ff11
-
Size
1.2MB
-
MD5
05585570f3bef87f9932bdc0b6e628b0
-
SHA1
b36e1029d879096bb59ec95549085213ebc9adc5
-
SHA256
91bfb3e8495b89be16f831e1dba0d1d1374566b949c7917c44926c209a36ff11
-
SHA512
c656808d5e3b782f2076b22d07ac4890e85a1ae1f67df6de1495b4b3e66e7f9726aeca06817a024ea15518024afb9ad0c64cace418c995dea2b64424002cedac
-
SSDEEP
24576:iytcUrmDtmPVg79zoP3fN+oq1cSxk1ydJyDIX0XPt+S3LSu:JtcUrPVg7hoffNG1e1ydg8X0YSb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-