General
-
Target
56c0f65119137098bc78a9b66e668c0453b65aba21e9491df63755b990289879
-
Size
719KB
-
Sample
230212-v5cn4seg9z
-
MD5
82779fd9ae659904cd7fea2c1411e165
-
SHA1
3b4145512981ab8d2546b47dec2bf402f1774505
-
SHA256
56c0f65119137098bc78a9b66e668c0453b65aba21e9491df63755b990289879
-
SHA512
858f65823321014173d59d61daff6ea6dbb47d7638edc1b9872facca08b19ace4da51cb2745c474d2dde2dd53a5c92fa691db24e0880cf8442b9649d519d39b7
-
SSDEEP
12288:MMrvy90Wv0q5/Ir1IgCo9X5xudvag1iFlpTP88QnzIP1GYdPe6/qXMDWs4se5iuU:byFtbo9X5xACWiFlpz88QnzIXdPeiXG4
Static task
static1
Behavioral task
behavioral1
Sample
56c0f65119137098bc78a9b66e668c0453b65aba21e9491df63755b990289879.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Targets
-
-
Target
56c0f65119137098bc78a9b66e668c0453b65aba21e9491df63755b990289879
-
Size
719KB
-
MD5
82779fd9ae659904cd7fea2c1411e165
-
SHA1
3b4145512981ab8d2546b47dec2bf402f1774505
-
SHA256
56c0f65119137098bc78a9b66e668c0453b65aba21e9491df63755b990289879
-
SHA512
858f65823321014173d59d61daff6ea6dbb47d7638edc1b9872facca08b19ace4da51cb2745c474d2dde2dd53a5c92fa691db24e0880cf8442b9649d519d39b7
-
SSDEEP
12288:MMrvy90Wv0q5/Ir1IgCo9X5xudvag1iFlpTP88QnzIP1GYdPe6/qXMDWs4se5iuU:byFtbo9X5xACWiFlpz88QnzIXdPeiXG4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-