General
-
Target
e7af03d4267a01cc713ca43e5cc91fc6a56c22e9ad5245df4e2795c6a86f138e
-
Size
725KB
-
Sample
230210-tg8k7sha9s
-
MD5
779ea638a578c1e11818f9033bbf1c59
-
SHA1
bbb69ed3c05dd231845d930318c85bc1bbd343b9
-
SHA256
e7af03d4267a01cc713ca43e5cc91fc6a56c22e9ad5245df4e2795c6a86f138e
-
SHA512
a9512038447bf3d6595028452b05c4bb4103d4e24e1d1455af4494f8ca631d358ae1ea2b8f74a03ec6ada3f123434eea4a08204da7ba3b2d781ad00fd858ca79
-
SSDEEP
12288:hMrey90LWxhlpVhmv1vwqV1Mesw2FERYiHN3NzIp6KtvPwoYUCK6:3y7nVh2lLV1Rp53g6gnNj6
Static task
static1
Behavioral task
behavioral1
Sample
e7af03d4267a01cc713ca43e5cc91fc6a56c22e9ad5245df4e2795c6a86f138e.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Targets
-
-
Target
e7af03d4267a01cc713ca43e5cc91fc6a56c22e9ad5245df4e2795c6a86f138e
-
Size
725KB
-
MD5
779ea638a578c1e11818f9033bbf1c59
-
SHA1
bbb69ed3c05dd231845d930318c85bc1bbd343b9
-
SHA256
e7af03d4267a01cc713ca43e5cc91fc6a56c22e9ad5245df4e2795c6a86f138e
-
SHA512
a9512038447bf3d6595028452b05c4bb4103d4e24e1d1455af4494f8ca631d358ae1ea2b8f74a03ec6ada3f123434eea4a08204da7ba3b2d781ad00fd858ca79
-
SSDEEP
12288:hMrey90LWxhlpVhmv1vwqV1Mesw2FERYiHN3NzIp6KtvPwoYUCK6:3y7nVh2lLV1Rp53g6gnNj6
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-