General
-
Target
f87e98af8bc18c45ed6e97f88954bf621ca95e7f8e18b418f72561ed0c953631
-
Size
723KB
-
Sample
230215-d6gwsahh92
-
MD5
e1933041c345ee3e523d9d3b616c5a8a
-
SHA1
1b7433c0583bea137de00c0fab66dc6cceeccffd
-
SHA256
f87e98af8bc18c45ed6e97f88954bf621ca95e7f8e18b418f72561ed0c953631
-
SHA512
9f2ac6c249cc4bfd1a2dd54dd3c0e03f2808e289fcf6fef193dc83bde39f7f0649d031eefd27419203792ec091862657c88a40697a609c1cfb00a85696ca642c
-
SSDEEP
12288:yMrsy90GUG05d83jkuIt6Rhf4aAvl6ldSy0HivtDIhOLLYULWqOP1Oui:SyOGC4j2gRh9AvHAIs5LR21Oui
Static task
static1
Behavioral task
behavioral1
Sample
f87e98af8bc18c45ed6e97f88954bf621ca95e7f8e18b418f72561ed0c953631.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Targets
-
-
Target
f87e98af8bc18c45ed6e97f88954bf621ca95e7f8e18b418f72561ed0c953631
-
Size
723KB
-
MD5
e1933041c345ee3e523d9d3b616c5a8a
-
SHA1
1b7433c0583bea137de00c0fab66dc6cceeccffd
-
SHA256
f87e98af8bc18c45ed6e97f88954bf621ca95e7f8e18b418f72561ed0c953631
-
SHA512
9f2ac6c249cc4bfd1a2dd54dd3c0e03f2808e289fcf6fef193dc83bde39f7f0649d031eefd27419203792ec091862657c88a40697a609c1cfb00a85696ca642c
-
SSDEEP
12288:yMrsy90GUG05d83jkuIt6Rhf4aAvl6ldSy0HivtDIhOLLYULWqOP1Oui:SyOGC4j2gRh9AvHAIs5LR21Oui
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-