General
-
Target
e6c39fa2f1cf2c97e61b648bc2c49796f1d4917bfe4c33320047d795bb488fb7
-
Size
796KB
-
Sample
230211-nh66waag63
-
MD5
e9f642aebd1e142d3e42493b0fc31828
-
SHA1
a773d37e0c3323de166f061693ce151e89fd6e9a
-
SHA256
e6c39fa2f1cf2c97e61b648bc2c49796f1d4917bfe4c33320047d795bb488fb7
-
SHA512
e45908b08b1a6873ffddeba0513eec5736319d33a1823ba47923b7fc9ac88aa218dc2679126aab1390b2f356719e6a4bffaa3479141be892fff52f2733fa95be
-
SSDEEP
24576:4yYsr2Ox5S01oqWtGxV3Nf3xY4s9tQrtLbU:/xHbx2q+GxVdf3e4BLb
Static task
static1
Behavioral task
behavioral1
Sample
e6c39fa2f1cf2c97e61b648bc2c49796f1d4917bfe4c33320047d795bb488fb7.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Targets
-
-
Target
e6c39fa2f1cf2c97e61b648bc2c49796f1d4917bfe4c33320047d795bb488fb7
-
Size
796KB
-
MD5
e9f642aebd1e142d3e42493b0fc31828
-
SHA1
a773d37e0c3323de166f061693ce151e89fd6e9a
-
SHA256
e6c39fa2f1cf2c97e61b648bc2c49796f1d4917bfe4c33320047d795bb488fb7
-
SHA512
e45908b08b1a6873ffddeba0513eec5736319d33a1823ba47923b7fc9ac88aa218dc2679126aab1390b2f356719e6a4bffaa3479141be892fff52f2733fa95be
-
SSDEEP
24576:4yYsr2Ox5S01oqWtGxV3Nf3xY4s9tQrtLbU:/xHbx2q+GxVdf3e4BLb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-