General
-
Target
f7c4a5b390a8a6699d904c932e70882168b6e393d5781a0e5c7b184109b48690
-
Size
735KB
-
Sample
230302-v65fhsdf3v
-
MD5
bb94afb432d4dcf8cae0869c08468721
-
SHA1
0dbd2abb1f0887c4f97bd6921209acbab6870aa2
-
SHA256
f7c4a5b390a8a6699d904c932e70882168b6e393d5781a0e5c7b184109b48690
-
SHA512
6f99073c4d6563e069805c49d0440f4e4b15e1c5c0ba352c0c63c7de2caf1f5c9e398ae8297390992f29d24ba5765046b57ae80b81ab8bc346f85327208ce0d1
-
SSDEEP
12288:uMrUy904S7CypHH9x+8ZaDgcMUj10CqFXBWwWCj+Fr75VkBTzWlAu:myGGypHb+8ZAAkwWCjWUV2Au
Static task
static1
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Targets
-
-
Target
f7c4a5b390a8a6699d904c932e70882168b6e393d5781a0e5c7b184109b48690
-
Size
735KB
-
MD5
bb94afb432d4dcf8cae0869c08468721
-
SHA1
0dbd2abb1f0887c4f97bd6921209acbab6870aa2
-
SHA256
f7c4a5b390a8a6699d904c932e70882168b6e393d5781a0e5c7b184109b48690
-
SHA512
6f99073c4d6563e069805c49d0440f4e4b15e1c5c0ba352c0c63c7de2caf1f5c9e398ae8297390992f29d24ba5765046b57ae80b81ab8bc346f85327208ce0d1
-
SSDEEP
12288:uMrUy904S7CypHH9x+8ZaDgcMUj10CqFXBWwWCj+Fr75VkBTzWlAu:myGGypHb+8ZAAkwWCjWUV2Au
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-