General
-
Target
4219c49118c9d4565f8b1a4b0dc4e78e59d2772b4a776bcdd0db896fd6324793
-
Size
719KB
-
Sample
230212-vv7fqsfd43
-
MD5
e3495284c42485bf4b8dc8e15b445059
-
SHA1
b4d90fa821c7334c05098e3aecaa64a43b205cea
-
SHA256
4219c49118c9d4565f8b1a4b0dc4e78e59d2772b4a776bcdd0db896fd6324793
-
SHA512
1d8bc9706598c8b27a3cfd8729fc9a9d8a38c4d4d935a296467b03dd7e0c14a119870aa479446bd1020714fbb499bc9012f149db7293a993fe35a9f30e44939e
-
SSDEEP
12288:vMr3y90acuexw015mCFfw+vSoQ7pwa7ws88iK3IPfMs1OQq8qvWweaRtKj0:wyzcuex3Dwan4pwAws88iK3I7O38quZK
Static task
static1
Behavioral task
behavioral1
Sample
4219c49118c9d4565f8b1a4b0dc4e78e59d2772b4a776bcdd0db896fd6324793.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Targets
-
-
Target
4219c49118c9d4565f8b1a4b0dc4e78e59d2772b4a776bcdd0db896fd6324793
-
Size
719KB
-
MD5
e3495284c42485bf4b8dc8e15b445059
-
SHA1
b4d90fa821c7334c05098e3aecaa64a43b205cea
-
SHA256
4219c49118c9d4565f8b1a4b0dc4e78e59d2772b4a776bcdd0db896fd6324793
-
SHA512
1d8bc9706598c8b27a3cfd8729fc9a9d8a38c4d4d935a296467b03dd7e0c14a119870aa479446bd1020714fbb499bc9012f149db7293a993fe35a9f30e44939e
-
SSDEEP
12288:vMr3y90acuexw015mCFfw+vSoQ7pwa7ws88iK3IPfMs1OQq8qvWweaRtKj0:wyzcuex3Dwan4pwAws88iK3I7O38quZK
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-