General
-
Target
810448abd4c07128bb0535b9f64493877634acb597f9f1e3898e8a5f7bdc8342
-
Size
976KB
-
Sample
230303-3f585abc8t
-
MD5
e733a13042cac7c9525ef0431c641748
-
SHA1
a3d0fbdae151d6a1ee65219c81736e5b0da272bc
-
SHA256
810448abd4c07128bb0535b9f64493877634acb597f9f1e3898e8a5f7bdc8342
-
SHA512
37c960a5aa6c3d6fcf769415ffb781d7379bfa2b6ec6d437f2ec872bb4e3c43240020d76ba66036e21e8b9c46a69552ba54e8f7ad40123aaf8c4e6ca34c4efd1
-
SSDEEP
24576:EbyvYVOe82TUGSGGNEavxo4RSLffnhA8iYmPuXCtPed:DvYkv20DJlQA8HXCt2
Static task
static1
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.26/Do3m4Gor/index.php
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
810448abd4c07128bb0535b9f64493877634acb597f9f1e3898e8a5f7bdc8342
-
Size
976KB
-
MD5
e733a13042cac7c9525ef0431c641748
-
SHA1
a3d0fbdae151d6a1ee65219c81736e5b0da272bc
-
SHA256
810448abd4c07128bb0535b9f64493877634acb597f9f1e3898e8a5f7bdc8342
-
SHA512
37c960a5aa6c3d6fcf769415ffb781d7379bfa2b6ec6d437f2ec872bb4e3c43240020d76ba66036e21e8b9c46a69552ba54e8f7ad40123aaf8c4e6ca34c4efd1
-
SSDEEP
24576:EbyvYVOe82TUGSGGNEavxo4RSLffnhA8iYmPuXCtPed:DvYkv20DJlQA8HXCt2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-