General
-
Target
eefa51edbc5d6792520f7ac1f5444c02.bin
-
Size
673KB
-
Sample
230213-ckqfcshe5y
-
MD5
34a0b269c281333ea735826034eb2cce
-
SHA1
90a581072110e50e1f07645fcb02969653fc6899
-
SHA256
0c2a0bceea951fc54e0a7af0999b4cb0e95930c9459fd93c84ce53766a56ddbb
-
SHA512
efa615bda6d1a4115f5c034a6668f56d4d3ecaa5cdfba177e663b96e71ee17209e7a3bf9aeb7c5076f4bce74f200300885a59cd2c9ac4030eb86cd74cf270512
-
SSDEEP
12288:SulodP6CkZGV03EavFxvc5ZlQ4tzMlOU4biD52jETiYtYqr+VTPfynWhA:+BV+GVy9kZu4BQC024TpK7A4A
Static task
static1
Behavioral task
behavioral1
Sample
8ed68d4f28bac6ad64ed1b3c05f109ead26a61f91fc06ea7d4d61b606f001c69.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8ed68d4f28bac6ad64ed1b3c05f109ead26a61f91fc06ea7d4d61b606f001c69.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
8ed68d4f28bac6ad64ed1b3c05f109ead26a61f91fc06ea7d4d61b606f001c69.exe
-
Size
723KB
-
MD5
eefa51edbc5d6792520f7ac1f5444c02
-
SHA1
b7806d9dd03f5cd1c6e39d7ba9a10c313a95ea84
-
SHA256
8ed68d4f28bac6ad64ed1b3c05f109ead26a61f91fc06ea7d4d61b606f001c69
-
SHA512
a396394a6cdb6c5aabb2f2da04e4e18cbcc75294ab127ac4a6bafabbfebd402d5209537f9ceed6f9a05e18d969c0b2788886a119989f7da5c81fde2cb8819202
-
SSDEEP
12288:DMrky9085jalMpw5M7DYlaBgvH2BBpeJ12dwb+5BMaxfz5b:/yV5e95GOXH2B0Ydwyr/dx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-