General
-
Target
3354322bffdb47db575568f002711d06.bin
-
Size
672KB
-
Sample
230213-bkrgzshb6w
-
MD5
6eecdcc3fbba88499f427c06f98baf99
-
SHA1
17a6e84513e22f62fe7f3eba4ac2847bebf9fb30
-
SHA256
ad55ff4de2450d88a999e1e6c1c6d4775ff2cde2419d210e295d7e5a146cb74c
-
SHA512
515d28ec35f2e7f0637164b6b6615582da00e145acafe98db33c295226eafbb5af1796e0b635c8cfc903bb1af9f05e04e21778214aa4c450d53ee1d0bfa27c9f
-
SSDEEP
12288:oD9j9YdlbvLrI2CtYuBV5qPV1Mh0/fNkjb1r2Ojc7EA3HhMg/OA/HW04pSK:oD9RUlbv/ItYuDANC0/+E7EA3yg/bHM
Static task
static1
Behavioral task
behavioral1
Sample
f94887bb6a709b828fb0250f1af423e24fc5bbc75e6bd775a2dda3a1070a64c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f94887bb6a709b828fb0250f1af423e24fc5bbc75e6bd775a2dda3a1070a64c7.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
f94887bb6a709b828fb0250f1af423e24fc5bbc75e6bd775a2dda3a1070a64c7.exe
-
Size
723KB
-
MD5
3354322bffdb47db575568f002711d06
-
SHA1
4487256ac5aae08df5d2599b0426bb2d9b01270d
-
SHA256
f94887bb6a709b828fb0250f1af423e24fc5bbc75e6bd775a2dda3a1070a64c7
-
SHA512
a12e1c365dc5c7eb6c1386e4f5380095fb522ca41c7494bbfc33d400e39b1151733defcd48c938b675f806b957f5f255cc975edd6ada0031eda08b9bf5b83bb5
-
SSDEEP
12288:WMrby90Vvms4+9RHufpZ2ZEqJOrd+XALPIeJ8auywXHE8hzC5k60fp:1yw+s4ktuTQA+Q98ayXk8h3fp
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-