General
-
Target
file.exe
-
Size
716KB
-
Sample
230213-edxxzaaa8v
-
MD5
96c1dade597cc024ccaa725c0b87bd7e
-
SHA1
9918e17dbf06844b5ead7ee2446e1af2dd3b27c7
-
SHA256
32c12bee4f12ef843dd78d5b76425b327e4690c6b1b41a8f38c8a62fc2d4a14d
-
SHA512
bddb3009928af242bdd3ccab932d3021364a0fa8639b663f68653e5740e482b61a33dd075cc6be58a57a2b8254239ed2354b220cc7cb2b9a18f1fefaa7925593
-
SSDEEP
12288:qMrsy905SVeg+7aEVI6fWENtQFBrEBcVq1eJNHXWRH3SMgx3KT0MF7/iT3m:WygSVYDVI0NtQICVxhmRHTgcTVqm
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
file.exe
-
Size
716KB
-
MD5
96c1dade597cc024ccaa725c0b87bd7e
-
SHA1
9918e17dbf06844b5ead7ee2446e1af2dd3b27c7
-
SHA256
32c12bee4f12ef843dd78d5b76425b327e4690c6b1b41a8f38c8a62fc2d4a14d
-
SHA512
bddb3009928af242bdd3ccab932d3021364a0fa8639b663f68653e5740e482b61a33dd075cc6be58a57a2b8254239ed2354b220cc7cb2b9a18f1fefaa7925593
-
SSDEEP
12288:qMrsy905SVeg+7aEVI6fWENtQFBrEBcVq1eJNHXWRH3SMgx3KT0MF7/iT3m:WygSVYDVI0NtQICVxhmRHTgcTVqm
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-