General
-
Target
9a58aebef2ba41f6b4e0709e37564bc6930303b7d95d5ed9b7e5d75a870b8520
-
Size
597KB
-
Sample
230302-zsys2aed3v
-
MD5
00cd6dfb0568050bf5920b1f7e4a9fb5
-
SHA1
4f98ce74f400b67818904b7fc763d3328cb86015
-
SHA256
9a58aebef2ba41f6b4e0709e37564bc6930303b7d95d5ed9b7e5d75a870b8520
-
SHA512
f86d220b3979aa29c564e41bd65d083d58a035cfdcee909b490cccf1b495d985d0c3db93a6e698fc38883f437c145ce3de77b6421fae4db77535450ecde9ce44
-
SSDEEP
12288:FMrky90yxdDwkYd/hpcg3SZaiRS7TVW8lQGgR2JoEdH:dyxJJkhisSk77JlDyEx
Static task
static1
Behavioral task
behavioral1
Sample
9a58aebef2ba41f6b4e0709e37564bc6930303b7d95d5ed9b7e5d75a870b8520.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Targets
-
-
Target
9a58aebef2ba41f6b4e0709e37564bc6930303b7d95d5ed9b7e5d75a870b8520
-
Size
597KB
-
MD5
00cd6dfb0568050bf5920b1f7e4a9fb5
-
SHA1
4f98ce74f400b67818904b7fc763d3328cb86015
-
SHA256
9a58aebef2ba41f6b4e0709e37564bc6930303b7d95d5ed9b7e5d75a870b8520
-
SHA512
f86d220b3979aa29c564e41bd65d083d58a035cfdcee909b490cccf1b495d985d0c3db93a6e698fc38883f437c145ce3de77b6421fae4db77535450ecde9ce44
-
SSDEEP
12288:FMrky90yxdDwkYd/hpcg3SZaiRS7TVW8lQGgR2JoEdH:dyxJJkhisSk77JlDyEx
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-