General
-
Target
5afa2cfa1315d681e56305d5295ada1c64433956729e0acef8f604f8860c5a57
-
Size
715KB
-
Sample
230212-2csm7agd2w
-
MD5
83e7746fba5b410bc91d814f7c58d291
-
SHA1
d2cd4c94e53c52cfb70e6120aff51c9d4b815738
-
SHA256
5afa2cfa1315d681e56305d5295ada1c64433956729e0acef8f604f8860c5a57
-
SHA512
4bc0ca5ad9d89e169242c32803f6e2201bfc911f0d6e69fb9da60be1933fb7b9379b4a0ab8f7034f1a8802f53156a13303878a09f34bf7a0bac5bf3f10b349f1
-
SSDEEP
12288:CMrfSy90KYuUeYV9SjBdtyMbk7qI8vFh9Hg/cfsneJcxqpLztCCjfR0r9NoqzSpT:oyOuUnVw3tyMbG+vFHcC4cLh7SRRSpT
Static task
static1
Behavioral task
behavioral1
Sample
5afa2cfa1315d681e56305d5295ada1c64433956729e0acef8f604f8860c5a57.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Targets
-
-
Target
5afa2cfa1315d681e56305d5295ada1c64433956729e0acef8f604f8860c5a57
-
Size
715KB
-
MD5
83e7746fba5b410bc91d814f7c58d291
-
SHA1
d2cd4c94e53c52cfb70e6120aff51c9d4b815738
-
SHA256
5afa2cfa1315d681e56305d5295ada1c64433956729e0acef8f604f8860c5a57
-
SHA512
4bc0ca5ad9d89e169242c32803f6e2201bfc911f0d6e69fb9da60be1933fb7b9379b4a0ab8f7034f1a8802f53156a13303878a09f34bf7a0bac5bf3f10b349f1
-
SSDEEP
12288:CMrfSy90KYuUeYV9SjBdtyMbk7qI8vFh9Hg/cfsneJcxqpLztCCjfR0r9NoqzSpT:oyOuUnVw3tyMbG+vFHcC4cLh7SRRSpT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-