General
-
Target
9f50d1538f69d88a51e4bf083d2a86d2cd7053d4c5c4c5f3f7a0fd0b4d9a2a3f
-
Size
723KB
-
Sample
230211-1791aacd27
-
MD5
949907e5a55dad23e7f06f6084c5a40b
-
SHA1
1288f4f5171c3b9453f4976c75766c600563a8ab
-
SHA256
9f50d1538f69d88a51e4bf083d2a86d2cd7053d4c5c4c5f3f7a0fd0b4d9a2a3f
-
SHA512
db2247848c2f87e0d126a99d948b3d9fc4eb8410170cdd292e743f1b4f89570d5dd5eb7454945d7b09ef2da7a0eccd55d14c065d835b47dad3c5bf7e63a02174
-
SSDEEP
12288:jMrmy909UOMbZG8Z02njwIvT6XFix88FB9IPMu50HmCm7kZZqJLcSBb7q1:5y6OY822jTO1W88FB9IE3moZZqJL/vq1
Static task
static1
Behavioral task
behavioral1
Sample
9f50d1538f69d88a51e4bf083d2a86d2cd7053d4c5c4c5f3f7a0fd0b4d9a2a3f.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Targets
-
-
Target
9f50d1538f69d88a51e4bf083d2a86d2cd7053d4c5c4c5f3f7a0fd0b4d9a2a3f
-
Size
723KB
-
MD5
949907e5a55dad23e7f06f6084c5a40b
-
SHA1
1288f4f5171c3b9453f4976c75766c600563a8ab
-
SHA256
9f50d1538f69d88a51e4bf083d2a86d2cd7053d4c5c4c5f3f7a0fd0b4d9a2a3f
-
SHA512
db2247848c2f87e0d126a99d948b3d9fc4eb8410170cdd292e743f1b4f89570d5dd5eb7454945d7b09ef2da7a0eccd55d14c065d835b47dad3c5bf7e63a02174
-
SSDEEP
12288:jMrmy909UOMbZG8Z02njwIvT6XFix88FB9IPMu50HmCm7kZZqJLcSBb7q1:5y6OY822jTO1W88FB9IE3moZZqJL/vq1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-