General
-
Target
55b1e83727eb3e8d0e81416df28e463d.exe
-
Size
795KB
-
Sample
230212-rt6ahaea3y
-
MD5
55b1e83727eb3e8d0e81416df28e463d
-
SHA1
2f4e8147b8c85ec85935ca3e51b1f11d7058702c
-
SHA256
b8057a405a626ca25d5d5820e6795588436f810714941d3560900352410a8b8d
-
SHA512
e544cf464b631d4bbd7265269c589f772ddf3054ea2a74d8c47995c3cffb096ee26b4b3806abf2c44f6b5440495c8ce51b1572340934a7284e46477140625be1
-
SSDEEP
12288:PMrdy90NmQapxJcqm4uzay880CkIP1JYC7TjcPnMOJaCwB57taEjj:KyimQamqu7880CkI7hUvdfwB57oe
Static task
static1
Behavioral task
behavioral1
Sample
55b1e83727eb3e8d0e81416df28e463d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
55b1e83727eb3e8d0e81416df28e463d.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
62.204.41.88/9vdVVVjsw/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Extracted
redline
LVH2
70.36.106.161:10456
-
auth_value
9ea6953ac0aefa4f612b65f2d391a27e
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Extracted
redline
crypt1
176.113.115.17:4132
-
auth_value
2e2ca7bbceaa9f98252a6f9fc0e6fa86
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Targets
-
-
Target
55b1e83727eb3e8d0e81416df28e463d.exe
-
Size
795KB
-
MD5
55b1e83727eb3e8d0e81416df28e463d
-
SHA1
2f4e8147b8c85ec85935ca3e51b1f11d7058702c
-
SHA256
b8057a405a626ca25d5d5820e6795588436f810714941d3560900352410a8b8d
-
SHA512
e544cf464b631d4bbd7265269c589f772ddf3054ea2a74d8c47995c3cffb096ee26b4b3806abf2c44f6b5440495c8ce51b1572340934a7284e46477140625be1
-
SSDEEP
12288:PMrdy90NmQapxJcqm4uzay880CkIP1JYC7TjcPnMOJaCwB57taEjj:KyimQamqu7880CkI7hUvdfwB57oe
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-