General
-
Target
2c2fa5a4633a2542f903f593268bcb6d306e5b62c807bb293a4b41c355f94c13
-
Size
739KB
-
Sample
230211-tpcthaad9w
-
MD5
8cab72f5de9ab7255d42e5a721c8c4e1
-
SHA1
c360caaba662212bf340bbbb9983c02a2adb0e65
-
SHA256
2c2fa5a4633a2542f903f593268bcb6d306e5b62c807bb293a4b41c355f94c13
-
SHA512
c9e563f07e7497d7dd7c4b1033b705d5e7061ee38183db77eb0d86f3f0c08a82c74e4b8c573b178f89a8afa2a652fc6b8b80ebe0d4219347872d812ee264a881
-
SSDEEP
12288:CMray90+yVaDXIAf3cqnFAKBJl88G7LIPLZm9FBjBSDoxBW/pwToasJ:kyQVeXI8sm88G7LIzYIDoxI/aToasJ
Static task
static1
Behavioral task
behavioral1
Sample
2c2fa5a4633a2542f903f593268bcb6d306e5b62c807bb293a4b41c355f94c13.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Targets
-
-
Target
2c2fa5a4633a2542f903f593268bcb6d306e5b62c807bb293a4b41c355f94c13
-
Size
739KB
-
MD5
8cab72f5de9ab7255d42e5a721c8c4e1
-
SHA1
c360caaba662212bf340bbbb9983c02a2adb0e65
-
SHA256
2c2fa5a4633a2542f903f593268bcb6d306e5b62c807bb293a4b41c355f94c13
-
SHA512
c9e563f07e7497d7dd7c4b1033b705d5e7061ee38183db77eb0d86f3f0c08a82c74e4b8c573b178f89a8afa2a652fc6b8b80ebe0d4219347872d812ee264a881
-
SSDEEP
12288:CMray90+yVaDXIAf3cqnFAKBJl88G7LIPLZm9FBjBSDoxBW/pwToasJ:kyQVeXI8sm88G7LIzYIDoxI/aToasJ
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-