General
-
Target
a87e10f01e6a101fef13cebe1a00523d510b5d7d0f8990a6b4f20e482b220f5b
-
Size
732KB
-
Sample
230302-x8xvkaed63
-
MD5
753423eaf930ca2d55e05cea98cfb531
-
SHA1
560f42ecf865534bfbb4d40f51741956b3dc0377
-
SHA256
a87e10f01e6a101fef13cebe1a00523d510b5d7d0f8990a6b4f20e482b220f5b
-
SHA512
4ea9aabe2e9575d1ac316b64a7083e5b007f1f4ca9fea0688f3810a4107a7d8b265425b9cdb490f58e495fd819f154b41d54473a127a5154b90f68bc442ccbc6
-
SSDEEP
12288:JMr7y90UhTLm0Ep3VU6IjcctEIUKB7tzmTmJv1eeF4hJaYO6F1xzs7:ay5hPu+0IUsITUd4uit4
Static task
static1
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Targets
-
-
Target
a87e10f01e6a101fef13cebe1a00523d510b5d7d0f8990a6b4f20e482b220f5b
-
Size
732KB
-
MD5
753423eaf930ca2d55e05cea98cfb531
-
SHA1
560f42ecf865534bfbb4d40f51741956b3dc0377
-
SHA256
a87e10f01e6a101fef13cebe1a00523d510b5d7d0f8990a6b4f20e482b220f5b
-
SHA512
4ea9aabe2e9575d1ac316b64a7083e5b007f1f4ca9fea0688f3810a4107a7d8b265425b9cdb490f58e495fd819f154b41d54473a127a5154b90f68bc442ccbc6
-
SSDEEP
12288:JMr7y90UhTLm0Ep3VU6IjcctEIUKB7tzmTmJv1eeF4hJaYO6F1xzs7:ay5hPu+0IUsITUd4uit4
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-