General
-
Target
ac138556f05c5e91cf4029c96c668d63.bin
-
Size
672KB
-
Sample
230213-cba93shd6x
-
MD5
60f9fe3477cb51b20773104f05892cdf
-
SHA1
ee06962043b83f2460be9ca7a8a791044ca70f03
-
SHA256
e2985b2e74afb514a7bb9b07498a3ab5d06c04bffb711f1052fb1ce32776019a
-
SHA512
72d53f8f6a0250ac98e52936af58d21aaefecd571e9429c8d2d742311259f9d93af3a34864fd070f2743c7e8251b1275de9e756d20ebb9e82f37648ba9a98d02
-
SSDEEP
12288:3NZWT8313dB02fkl9NtiZsVU5Ns6dyE6IE7JpzJm0KH4/p+pQ8BxjyXtFq+FsUy4:9Zy8FNBFcW6wNsM63pzJmikyuKtFqgBx
Static task
static1
Behavioral task
behavioral1
Sample
12d33f4cbc325d482897189e88c086a4da7231cfe927d54f1851265d25f7fe75.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12d33f4cbc325d482897189e88c086a4da7231cfe927d54f1851265d25f7fe75.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
12d33f4cbc325d482897189e88c086a4da7231cfe927d54f1851265d25f7fe75.exe
-
Size
723KB
-
MD5
ac138556f05c5e91cf4029c96c668d63
-
SHA1
1447ecc6d95e1130b690489667742108f05a563c
-
SHA256
12d33f4cbc325d482897189e88c086a4da7231cfe927d54f1851265d25f7fe75
-
SHA512
e070314bb8d3c72c5a9d69716a03317811928993d1337ec5328ef6c071658c76c3b08dd31ae1ac06df507a50cbec02c3122d134f6f2a292bdb3c279c21507a52
-
SSDEEP
12288:OMrty90lgmqBXx6ukI4T0iGiv4P2weJIRomQAg0QkhLjUP1Ke:jy2gDh6uOYiGiv7ogChLgPd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-