General
-
Target
993fae410de88ca66cb5ba99a1b28528069f74298696fc533faba14d99c5689d
-
Size
714KB
-
Sample
230214-mzst5scg68
-
MD5
de25f80b75c009b9abbb670a7b675c33
-
SHA1
6b42b14ec6befca7b6e0092caf894823eecddb40
-
SHA256
993fae410de88ca66cb5ba99a1b28528069f74298696fc533faba14d99c5689d
-
SHA512
66f4c0ebab823fb2fa398f3d503f2d4a52186144a439455e5748786b09bf6defadf57c24aa88140708cbd5734699f846d4933b26097198538243822ab4926404
-
SSDEEP
12288:ZMrSy90dBtssXUjzgn5lyDELw4eF8PJvDZDJxgKChMj1cxXMvCc11/f7mrVOb7nO:byCtnEjzg5WEs488PJvDZdCxhMYcvCUg
Static task
static1
Behavioral task
behavioral1
Sample
993fae410de88ca66cb5ba99a1b28528069f74298696fc533faba14d99c5689d.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Targets
-
-
Target
993fae410de88ca66cb5ba99a1b28528069f74298696fc533faba14d99c5689d
-
Size
714KB
-
MD5
de25f80b75c009b9abbb670a7b675c33
-
SHA1
6b42b14ec6befca7b6e0092caf894823eecddb40
-
SHA256
993fae410de88ca66cb5ba99a1b28528069f74298696fc533faba14d99c5689d
-
SHA512
66f4c0ebab823fb2fa398f3d503f2d4a52186144a439455e5748786b09bf6defadf57c24aa88140708cbd5734699f846d4933b26097198538243822ab4926404
-
SSDEEP
12288:ZMrSy90dBtssXUjzgn5lyDELw4eF8PJvDZDJxgKChMj1cxXMvCc11/f7mrVOb7nO:byCtnEjzg5WEs488PJvDZdCxhMYcvCUg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-