General
-
Target
85af7ee4c3ce49106a85ad4992b351d464b0321ad36560fd456b23b09cac8c7c
-
Size
985KB
-
Sample
230303-3mhfmsbd2x
-
MD5
b7e193cd30545922b0ec39c3912fb883
-
SHA1
d8de8e7e278aa250a53f59788eb5775efe398867
-
SHA256
85af7ee4c3ce49106a85ad4992b351d464b0321ad36560fd456b23b09cac8c7c
-
SHA512
dc6c7fcb1b4087a66cfdc6a97f24b8e1313502c6d7d47e9463a2c30ebe3e5b4ddef9342d727d744db708dffa5dd296a5a25bbb5f67175e9616cd75d7cd6b7074
-
SSDEEP
24576:pyDJzia/sib+6mADTRwaFhYDO4TLmWyfh9LC:cDTJb+6mAzTYjAhR
Static task
static1
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
amadey
3.68
193.233.20.25/buH5N004d/index.php
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Targets
-
-
Target
85af7ee4c3ce49106a85ad4992b351d464b0321ad36560fd456b23b09cac8c7c
-
Size
985KB
-
MD5
b7e193cd30545922b0ec39c3912fb883
-
SHA1
d8de8e7e278aa250a53f59788eb5775efe398867
-
SHA256
85af7ee4c3ce49106a85ad4992b351d464b0321ad36560fd456b23b09cac8c7c
-
SHA512
dc6c7fcb1b4087a66cfdc6a97f24b8e1313502c6d7d47e9463a2c30ebe3e5b4ddef9342d727d744db708dffa5dd296a5a25bbb5f67175e9616cd75d7cd6b7074
-
SSDEEP
24576:pyDJzia/sib+6mADTRwaFhYDO4TLmWyfh9LC:cDTJb+6mAzTYjAhR
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-