General
-
Target
97dae4129ff58d345d41d83f9f262966a6e4580af39a6d5c6714d221a2a2ad1e
-
Size
715KB
-
Sample
230213-alxvqahe77
-
MD5
445c892a2214a52f39c2b1ad02bec4c1
-
SHA1
2d9228c35eb2356d74e75ed067e72cef9a41dfbc
-
SHA256
97dae4129ff58d345d41d83f9f262966a6e4580af39a6d5c6714d221a2a2ad1e
-
SHA512
26c1c4b4b74e648a349f2a1906f78616c4b795a60112fa27ec9eb2e06006c3bb6cda6c64d4b62210cdd7935f0d379c1c2126acbfb43f2cdf700a863d56589a2f
-
SSDEEP
12288:cMrOy90ZPK2M7XJbQ0Q6hs0T1ciGSDcJmeJdo0Z7kwp1inMHs2jnIm4GRI:aysS2M7XJbQh6hFZciVSd9Z73FMkIz2I
Static task
static1
Behavioral task
behavioral1
Sample
97dae4129ff58d345d41d83f9f262966a6e4580af39a6d5c6714d221a2a2ad1e.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Targets
-
-
Target
97dae4129ff58d345d41d83f9f262966a6e4580af39a6d5c6714d221a2a2ad1e
-
Size
715KB
-
MD5
445c892a2214a52f39c2b1ad02bec4c1
-
SHA1
2d9228c35eb2356d74e75ed067e72cef9a41dfbc
-
SHA256
97dae4129ff58d345d41d83f9f262966a6e4580af39a6d5c6714d221a2a2ad1e
-
SHA512
26c1c4b4b74e648a349f2a1906f78616c4b795a60112fa27ec9eb2e06006c3bb6cda6c64d4b62210cdd7935f0d379c1c2126acbfb43f2cdf700a863d56589a2f
-
SSDEEP
12288:cMrOy90ZPK2M7XJbQ0Q6hs0T1ciGSDcJmeJdo0Z7kwp1inMHs2jnIm4GRI:aysS2M7XJbQh6hFZciVSd9Z73FMkIz2I
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-