General
-
Target
c58bd2ea3642f434279a68451eedeb87ea1b5659a6df377782a929c8961f2068
-
Size
725KB
-
Sample
230215-lnx42sbc45
-
MD5
2bb2bc3d9332708cddbe0bc7b09a7412
-
SHA1
8c1ab20729a14210916f80013d61ec191b907a56
-
SHA256
c58bd2ea3642f434279a68451eedeb87ea1b5659a6df377782a929c8961f2068
-
SHA512
25dfe9b61650edf1fb0872ab828ba194d6d3dff7d2ec5d781e574d70e38e0f6b1a027bca8fb71fe75b28cc2d6e8a04a1e2f8a608c30c52fc9e2516ca53a775fd
-
SSDEEP
12288:fMrGy909PNC27fHUCT5kVRRaa/JfgLFf6D+yDx3rcNdc3Y3xpPwjTKU+:hyW427fHVMi8BgLds+k3HjA
Static task
static1
Behavioral task
behavioral1
Sample
c58bd2ea3642f434279a68451eedeb87ea1b5659a6df377782a929c8961f2068.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
amadey
3.66
193.233.20.4/t6r48nSa/index.php
Targets
-
-
Target
c58bd2ea3642f434279a68451eedeb87ea1b5659a6df377782a929c8961f2068
-
Size
725KB
-
MD5
2bb2bc3d9332708cddbe0bc7b09a7412
-
SHA1
8c1ab20729a14210916f80013d61ec191b907a56
-
SHA256
c58bd2ea3642f434279a68451eedeb87ea1b5659a6df377782a929c8961f2068
-
SHA512
25dfe9b61650edf1fb0872ab828ba194d6d3dff7d2ec5d781e574d70e38e0f6b1a027bca8fb71fe75b28cc2d6e8a04a1e2f8a608c30c52fc9e2516ca53a775fd
-
SSDEEP
12288:fMrGy909PNC27fHUCT5kVRRaa/JfgLFf6D+yDx3rcNdc3Y3xpPwjTKU+:hyW427fHVMi8BgLds+k3HjA
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-