General
-
Target
file.exe
-
Size
715KB
-
Sample
230214-hcbvwsag4w
-
MD5
be7731c16de3cedc82b0da034754a078
-
SHA1
625e99015f49790547da678910b45ec8e3305411
-
SHA256
d76b24903d109697c5a5928577549ca30f628a1b95b404887d9eeb56aef79b76
-
SHA512
51fa002f18f192ba42154e8d06abd4617f183147f6bd50c1d8e6cf50bcc3be589bb2fa05049af8dc7a6b935ca2d7eb27eca80cfbf71cd70e9fd50e6d3fcf80dd
-
SSDEEP
12288:9Mrty90YZHQ4U3LR9Yl/e69Gj6IgFx4Iawz88O2yQBuAR2P8iY:UyzVQR9E2r1I7NZj2P4
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
amadey
3.66
193.233.20.2/Bn89hku/index.php
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Targets
-
-
Target
file.exe
-
Size
715KB
-
MD5
be7731c16de3cedc82b0da034754a078
-
SHA1
625e99015f49790547da678910b45ec8e3305411
-
SHA256
d76b24903d109697c5a5928577549ca30f628a1b95b404887d9eeb56aef79b76
-
SHA512
51fa002f18f192ba42154e8d06abd4617f183147f6bd50c1d8e6cf50bcc3be589bb2fa05049af8dc7a6b935ca2d7eb27eca80cfbf71cd70e9fd50e6d3fcf80dd
-
SSDEEP
12288:9Mrty90YZHQ4U3LR9Yl/e69Gj6IgFx4Iawz88O2yQBuAR2P8iY:UyzVQR9E2r1I7NZj2P4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-