General
-
Target
24302b602d8488956238e5309fc0281620ea3658ba9e445272fb48e0f361fbfb
-
Size
796KB
-
Sample
230211-hrbhnsed61
-
MD5
49da2d9edc1ba57f261fb45cc463550f
-
SHA1
14731ef01384af2f974f76186aed77278b877524
-
SHA256
24302b602d8488956238e5309fc0281620ea3658ba9e445272fb48e0f361fbfb
-
SHA512
54cc5291e7db302041b6e947f5c95fa28a6c8b1da75d2a5ef6b9aa440e493d659274effef9729d1bca1ef4ce601460c1e254b5d79889a0a2d5d085e9208cf353
-
SSDEEP
24576:SyHPCgt/s88ZMOIevF43QUSKLSf4RMdUg:5v5s88ZnzvKZPLhR
Static task
static1
Behavioral task
behavioral1
Sample
24302b602d8488956238e5309fc0281620ea3658ba9e445272fb48e0f361fbfb.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Targets
-
-
Target
24302b602d8488956238e5309fc0281620ea3658ba9e445272fb48e0f361fbfb
-
Size
796KB
-
MD5
49da2d9edc1ba57f261fb45cc463550f
-
SHA1
14731ef01384af2f974f76186aed77278b877524
-
SHA256
24302b602d8488956238e5309fc0281620ea3658ba9e445272fb48e0f361fbfb
-
SHA512
54cc5291e7db302041b6e947f5c95fa28a6c8b1da75d2a5ef6b9aa440e493d659274effef9729d1bca1ef4ce601460c1e254b5d79889a0a2d5d085e9208cf353
-
SSDEEP
24576:SyHPCgt/s88ZMOIevF43QUSKLSf4RMdUg:5v5s88ZnzvKZPLhR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-