General
-
Target
efd709599177711407cbf090d5828fcd.bin
-
Size
1.1MB
-
Sample
230212-b8zhhaba26
-
MD5
7db5aed1b7b02d9616fc4fe1085c9b33
-
SHA1
4e690ea057be92825063465d2dd612d291882095
-
SHA256
da3d0238b82c210b9632f9ea475e061036dd9901ab87a821265e07d1786b54b3
-
SHA512
6dc68248694298021a2afd393c65c26e84fe488b865b272dfa78742b5ced0ad447023bef1d575545f6bff44e6aa1f3f2ce4ff7c1d1168b9ba1edbc634b168722
-
SSDEEP
24576:oH8m6U/xiQ2NXyVaezH70/La6k2BiHANZqROrnIxFZVOjqrNhFK2C:oHd60xivNCVaez16FBsANZqkTcZ2qrNO
Static task
static1
Behavioral task
behavioral1
Sample
6509ef9d3d0f59c8df5d7077b7ff5a5c909b0225091292e7118ffb818f4edf65.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6509ef9d3d0f59c8df5d7077b7ff5a5c909b0225091292e7118ffb818f4edf65.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
6509ef9d3d0f59c8df5d7077b7ff5a5c909b0225091292e7118ffb818f4edf65.exe
-
Size
1.1MB
-
MD5
efd709599177711407cbf090d5828fcd
-
SHA1
2d900e4800e87a8c873559250bd508e22d76a07f
-
SHA256
6509ef9d3d0f59c8df5d7077b7ff5a5c909b0225091292e7118ffb818f4edf65
-
SHA512
d695d4694b1145ada9d518ea2808880787adf18760fe9a6e15b411c34001181598e5257e7c6a3523650506523c554123668cd604f68783c379d62f635250630b
-
SSDEEP
24576:9yQ1VaiVedPHDSGxOJsCJKmX7/n/9MaqLIwEWw7Jz1i:YQ1giVMSGxObbL/+v7EWwL
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-