General
-
Target
d8e36a0751bb6793f1db57e4f3bc1e80.exe
-
Size
720KB
-
Sample
230215-fmzzcshg8x
-
MD5
d8e36a0751bb6793f1db57e4f3bc1e80
-
SHA1
75962435d86def9bfe5966baf53f573e9180c50c
-
SHA256
c455d90711a9f3d3255bc5775db67501e00b1da0b867d393fe8cc2a00b49b9b1
-
SHA512
35b9915e645d18589006979b06b695432bb27ba14c95628dfc61482c0d7af3cba5282d4437c8b6cc0acdf71e4a3409b3c73fefe198e5446e714bb1cc95e5c172
-
SSDEEP
12288:8MrZy90dy5tPx2WFSJgkkrhSm8MaxjsOnJXG1JuWs52RvB8M2Ff5SosR5KN5SN0i:dySqZyZqSnIOn9G1JuWs52l+vOKyupUf
Static task
static1
Behavioral task
behavioral1
Sample
d8e36a0751bb6793f1db57e4f3bc1e80.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d8e36a0751bb6793f1db57e4f3bc1e80.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Targets
-
-
Target
d8e36a0751bb6793f1db57e4f3bc1e80.exe
-
Size
720KB
-
MD5
d8e36a0751bb6793f1db57e4f3bc1e80
-
SHA1
75962435d86def9bfe5966baf53f573e9180c50c
-
SHA256
c455d90711a9f3d3255bc5775db67501e00b1da0b867d393fe8cc2a00b49b9b1
-
SHA512
35b9915e645d18589006979b06b695432bb27ba14c95628dfc61482c0d7af3cba5282d4437c8b6cc0acdf71e4a3409b3c73fefe198e5446e714bb1cc95e5c172
-
SSDEEP
12288:8MrZy90dy5tPx2WFSJgkkrhSm8MaxjsOnJXG1JuWs52RvB8M2Ff5SosR5KN5SN0i:dySqZyZqSnIOn9G1JuWs52l+vOKyupUf
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-